Examples of using Security rules in English and their translations into Slovak
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
Some security rules.
Apparently it didn't meet their security rules.
Security rules- change.
Follow basic security rules.
Security rules creation.
Creating and testing connection security rules.
Costs of administrating security rules, including compliance monitoring.
You must at all times observe the security rules.
Security rules on the protection of classified and sensitive non-classified information.
Make your kids aware of the security rules before the holiday.
On proposal of the European Commission, of legally binding operational security rules;
Think about setting up strict security rules with contractual financial responsibility.
In fact,the power stations are still fully functional and strict security rules apply here.
Security rules on the protection of classified and sensitive non-classified information.
The client gets a rationale for setting up security rules, e.g. for trainings, etc.
Dedicated Firewall Our servicesare protected by dedicated firewall with IP security rules.
Article 25- Security rules on the protection of classified and sensitive non-classified information.
Definition of the basic aspects of information security management, security rules, etc.
ENISA's security rules shall include provisions for the exchange, processing and storage of such information.
Over the past 3 years,the Commission has taken decisive action to tighten security rules within the EU and at its external borders.
Article 11b, Security rules on the protection of classified information and non-classified sensitive information(New).
Warning: When using the Unlimited number of aliases, all domains work under one user account,ie it is necessary to observe security rules.
With each field mission we set specific and detailed security rules and plans, specify strategies and introduce security measures and obligations.
Virtual networking enables you to create private networks in the cloud with full control over IP addresses,DNS servers, security rules and traffic flows.
(bb)adopt, after the prior approval of the Commission, the security rules of the Agency on protecting EU classified information and sensitive non-classified information as refrerred to in Article 91;
The Commission therefore proposes Community action to enhance the security in the land transport supplychain to complement existing Community transport security rules.
Subject to the prior approval of the Commission, adopt the security rules of the Agency on protecting EUCI and sensitive non-classified information as referred to in Article 92;
Beneficiaries shall disseminate their results as soon as possible, in an open format,subject to any restrictions due to the protection of intellectual property, security rules or legitimate interests.
The results of research funded by the Agency shall be published,unless the applicable rules of intellectual property law or the security rules of the Agency referred to in Article 112 preclude such publication.