Examples of using Identity data in English and their translations into Slovenian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Computer
-
Official/political
-
Programming
Identity Data.
Basic contact data( identity data).
Identity data is presented in several tabs.
(a)the linked data shares the same biometric and the same or similar identity data;
The Identity data of users are considered confidential.
(a)the linked data shares the same biometric and the same or similar identity data;
Identity data, contact data, Location data. .
(a) the linked data share the same biometric data but have similar or different identity data;
Identity Data includes first name, last name, username, IBO/ABO number, and Amway upline name and pin level.
We respect generally accepted standards to protect personal and identity data transmitted to us both during and after transmission.
The linked data share the same biometric data, the same travel document data and similar identity data;
(b)the linked data has different identity data and no manual verification of different identity has taken place.
The answer to these challenges is a service that would allow individualsto enter, control and share their identity data their way--on the devices they use every day.
The linked data have similar or different identity data, and share the same travel document data, but have different biometric data. .
To fix this, the two firms plan to launch a service that wouldallow individuals to enter, control and share their identity data their way- on the devices they use every day.
Where the query reports one or several hit(s) and the identity data of the linked files is identical or similar, a white link shall be created in accordance with Article 33.
The Ombudsman, the Deputy Ombudsmen, the officials and the authorised employees of the Ombudsman Bureau shallcarry offical identification cards with their photographs, identity data, and quotation of powers.
Where a yellow link is created,the MID shall grant access to the identity data present in the different EU information systems to the ETIAS Central Unit.
Attacks committed by misusing identity data, i.e. by concealing the real identity of the perpetrator and causing prejudice to the rightful identity owner(such attacks would also be included under aggravating circumstances with higher penalty levels);
We have the opportunity toestablish a system that puts people first and gives them control over their identity data and where they are used,”says Ajay Bhalla, head of cyber and information solutions at Mastercard.
(b)the linked data has similar identity data and the authority responsible for the verification of different identities concluded it refers unlawfully to the same person.
The systems share a common identity repository with alphanumeric identity data, to detect if a person is registered under multipleidentities in different databases.
The linked data have different identity data but share the same travel document data, and at least one of the EU information systems does not contain biometric data on the person concerned;
To propose measures to maintain the integrity of identity data in all the phases of the"identity chain" and to ensure the EU wide criminalization of identity related fraud.
Ministers focussed their discussion on attacks committed by misusing identity data, i.e. by concealing the real identity of the perpetrator and causing prejudice to the rightful identity owner.
(1) Constitutional Court judges have cards with their photographs and identity data, with which they exercise their immunity rights, and other documents on the basis of which they can be provided assistance from public law enforcement officers.
Where the query reports one or several hit(s) and the identity data of the linked files cannot be considered as similar, a yellow link shall be created in accordance with Article 30 and the procedure referred to in Article 29 shall apply.
Where the query reports one or several matches and the identity data in the linked files cannot be considered to be similar, a yellow link shall be created in accordance with Article 30 and the procedure referred to in Article 29 shall apply.
Attacks committed by misusing another person's identity data, i.e. by concealing the real identity of the perpetrator and thus gaining the trust of a third party(such attacks should be considered as aggravating circumstances with higher penalty levels);