Examples of using Control of data in English and their translations into Slovenian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Computer
-
Official/political
-
Programming
Greater control of data.
Increased security and better control of data.
Allows control of data.
Designing and installing ETL system for the acquisition, integration,treatment and control of data.
Internet companies' control of data gives them enormous power.
Logs or documentation prepared under paragraph 1 shall becommunicated on request to the competent supervisory authority for the control of data protection.
The SIRENE control of data quality seemed beneficial.
The Client has no control of data.
Quality control of data obtained by measurements at the sea.
Google… became one of thefirst major Internet companies to put control of data after death directly into the hands of its users.
Logs or documentation prepared under paragraph 1 shall be communicated onrequest to the European Data Protection Supervisor for the control of data protection.
Optimal management and control of data is essential if it is to be used effectively.
The deadline for recording transactions into business books is 3(three) days before preparing accounts,so that accounting control of data in business books can be carried out.
Such logs shall only be used for the control of data protection and for ensuring proper data processing as well as data integrity and security.
Ensure that it is possible to verify and establish what data has been processed in the EES, when,by whom and for what purpose(control of data recording);
If Ethereum manages to take roots, services like these will in the future hand control of data back to owners and the intellectual property rights back to the author.
Prevent the unauthorised processing of data in Eurodac and any unauthorised modification orerasure of data processed in Eurodac(control of data entry);
The information thuscommunicated shall only be used for the control of data protection and for ensuring proper data processing as well as data integrity and security.
(ea) prevent the unauthorised processing of data in SIS and any unauthorised modification orerasure of data processed in SIS(control of data entry);
The European Data Protection Supervisor shall use that information only for the control of data protection and ensuring proper data processing as well as data integrity and security.
Prof Hayes, from the University of the West of England(UWE) in Bristol, says the technology beingused is simple, but will enable people to take control of data where they live.
This will harmonize data protection rules across the economic block,seeking to put control of data back in the hands of the user, while also sharpening the rules for the firms responsible for handling that information.
(f) prevent the unauthorised processing of data in Eurodac and any unauthorised modification orerasure of data processed in Eurodac(control of data entry);deleted.
REM provides traceability, security and control of data, because any medical information may be entered at the moment of its occurrence, and at the same time, details of the person and the time of data entry are recorded as well.
(i) ensure that it is possible to verify and establish what kind of data has been processed in the Central Repository, when,by whom and for what purpose(control of data recording);
Prevent the unauthorised processing of data in the EES and any unauthorised modification ordeletion of data processed in the EES(control of data entry);
(e) prevent the unauthorised processing of data in the Central Repository and any unauthorised modification ordeletion of data processed in the Central Repository(control of data entry);
Originators, sponsors and SSPE's should make freely available the information to investors, via standardised templates,on a website that meets certain criteria such as control of data quality and business continuity.
IT managers are excited about Citrix XenMobile as they can finally allow clients/employees at their working place to use all those mobile devices they want, and the information environment of the enterprise will accept them andtake care of the appropriate security and control of data and applications on them.