Examples of using Modification or deletion in English and their translations into Slovenian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Computer
-
Official/political
-
Programming
Users are the only owner of their Data and can request modification or deletion at any time.
No termination, interruption, modification or deletion of the Services will likely result in compensation to the User.
Users are the sole owners of their data and may request its modification or deletion at any time.
No termination, interruption, modification or deletion of the Services will grant a right to compensation to the User.
Prevent the unauthorised input of data and the unauthorised inspection, modification or deletion of stored personal data;
(8) prevent unauthorized reading, copying, modification or deletion of personal data during transfers of personal dataor during transportation of data media(transport control);
Prevent the unauthorised processing of data in the EES and any unauthorised modification or deletion of data processed in the EES;
Prevent the unauthorised reading, copying, modification or deletion of personal data during transfers of personal dataor during the transportation of data media(transport control);
(c) prevent the unauthorized input of data and the unauthorized inspection, modification or deletion of stored personal data(storage control);
Prevent the unauthorised reading, copying, modification or deletion of personal data during the transmission of personal data to or from the EES or during the transport of data media, in particular by means of appropriate encryption techniques;
Prevent the unauthorised input of data and the unauthorised inspection, modification or deletion of stored personal data(storage control);(d).
(j)prevent the unauthorised reading, copying, modification or deletion of personal data during the transmission of personal data to or from the ECRIS-TCN system or during the transport of data media, in particular by means of appropriate encryption techniques;
Prevent the unauthorised input of data and the unauthorised inspection, modification or deletion of stored personal data(storage control);
Prevent the unauthorised reading, copying, modification or deletion of personal data during the transmission of personal data to or from the EES or during the transport of data media, in particular by means of appropriate encryption techniques(transport control);
(c) prevent the unauthorised input of data and the unauthorised inspection, modification or deletion of stored personal data;
(a) prevent at all times any unauthorised reading, copying, modification or deletion of data, in particular during their transmission to the diplomatic missionor consular post of the Member State(s) competent for processing an application;
(e)prevent the unauthorised processing of data in the ECRIS-TCN system and any unauthorised modification or deletion of data processed in the ECRIS-TCN system;
(j)prevent the unauthorised reading, copying, modification or deletion of personal data during the transmission of personal data to or from the ETIAS Central System or during the transport of data media, in particular by means of appropriate encryption techniques;
(d) prevent the unauthorised input of data and the unauthorised inspection, modification or deletion of stored personal data(storage control);
(h)prevent the unauthorised reading, copying, modification or deletion of personal data during the transmission of personal data toor from the interoperability components or during the transport of data media, in particular by means of appropriate encryption techniques;
Prevent the unauthorised processing of data in the EES and any unauthorised modification or deletion of data processed in the EES(control of data entry);
(j) prevent the unauthorised reading, copying, modification or deletion of personal data during the transmission of personal data toor from the Central Repository or during the transport of data media, in particular by means of appropriate encryption techniques(transport control);
(e) prevent the unauthorised processing of data in the Central Repository andany unauthorised modification or deletion of data processed in the Central Repository(control of data entry);
A Regulation on the setting, modification or deletion of an MRL designed to amend non-essential elements of this Regulation which shall be adopted in accordance with the regulatory procedure with scrutiny referred to in Article 45(4); on imperative grounds of urgency, the Commission may use the urgency procedure referred to in Article 45(5);
Visitors may upload completed Europass CVs or Language Passports from their computers onto the Europass server,and then proceed with verification, modification or deletion of any of the information contained in the Europass document.
The Agency shall adopt appropriate measures, including security plans, inter alia, to prevent the unauthorised reading,copying, modification or deletion of personal data during transfers of personal dataor transport of data media, in particular by means of appropriate encryption techniques.
In addition to the vehicle identification number, we transfer your user name(Porsche ID), the technical or sales availability of services and product offers for your user account or vehicle,as well as relevant events as part of the creation, modification or deletion of your user account, the linking of vehicles, the selection of traders, or the activation or deactivation of services.
Appropriate measures including security plans shall be adopted by the Agency inter alia, to prevent the unauthorised reading,copying, modification or deletion of personal data during transfers of personal dataor transport of data media, in particular by means of appropriate encryption techniques.