Examples of using To sensitive data in English and their translations into Slovak
{-}
-
Official
-
Colloquial
-
Medicine
-
Financial
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
How are we controlling access to sensitive data?
Its aim is to gain access to sensitive data such as bank account numbers, PIN codes, etc.
While managers have the ability to control access to sensitive data.
Phishing is often used to gain access to sensitive data such as bank account numbers, PIN numbers and more.
That will provide you with additional security when it comes to sensitive data.
People also translate
Privileged accounts provide access to sensitive data and critical systems.
Motion for a European Parliament resolution on computer applications andrequests for access to sensitive data.
The purpose of these scams is to gain access to sensitive data such as bank account numbers, PIN codes, etc.
It is a hardware-based solution that helps to avoid attacks by hackerslooking to capture passwords and encryption keys to sensitive data.
Prevent unauthorized access: Deter users from access to sensitive data with a built-in fingerprint reader.
It is a hardware-based solution that helps to avoid attacks by hackers looking to capture passwords andencryption keys to sensitive data.
The US will be able to have access to sensitive data and even to use it in cases of petty crime, which is not fighting terrorism.
Security Note:User roles should not be used to restrict access to sensitive data in a form.
Survio states that it has no access to sensitive data related to the payment method used by the user, nor does it store said information.
Security Note:User roles should not be used to restrict access to sensitive data in a form.
Phishing is often used to gain access to sensitive data such as bank account numbers, credit card numbers, PIN numbers or usernames and passwords.
Acquisition enables Imperva customers to increase user access to sensitive data assets while reducing risk.
Phishing is often used to gain access to sensitive data such as bank account numbers, credit card numbers, PIN numbers or usernames and passwords.
An organization is not required to obtain affirmative express consent(opt in)with respect to sensitive data where the processing is.
It provides everything you need for secure access to sensitive data, reduces storage costs and saves time thanks to the automation of tasks and processes.
It is necessary to further specify safeguards applicable to the processed personal data and in particular to sensitive data such as biometric identifiers.
Acquisition enables Imperva customers to increase user access to sensitive data assets while reducing risk Imperva has acquired the assets of Camouflage Software, Inc.
The Trusted Platform Module(TPM) is a hardware chip integrated on the motherboard to encrypt data therebyreducing the risks unauthorised capturing of password and encryption keys to sensitive data.
Whether viruses, malware, ransomware or targeted APT attacks,their common goal is to get to sensitive data of institutions, private companies and even hospitals.
Trusted Platform Module(TPM) is a hardware chip integrated on the motherboard that securely encrypts data, reducing therisks posed by hackers looking to capture password and encryption keys to sensitive data.
Additionally, when you use EFS,users can protect files from unauthorized access to sensitive data that includes data from a stolen laptop or an external disk drive.
The term phishing describes a criminal activity thatuses the manipulation of users to gain access to sensitive data such as bank account numbers, credit card numbers, PIN numbers or usernames and passwords.