Examples of using The use of encryption in English and their translations into Slovenian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Computer
-
Official/political
-
Programming
Transmitted to other Web sites, it is protected through the use of encryption.
Thanks to the use of encryption and anonymisation tools by both users and websites, there is virtually no law enforcement presence down in the Dark.
Protecting all electronic transactions entered into via the website through the use of encryption technology.
UK prime minister DavidCameron immediately proposed measures to limit the use of encryption, while the Australian attorney general used the Paris events to justify greater powers for the police and security services.
When we process highly confidential information(such as credit card numbers) over the Internet,we protect it through the use of encryption.
Urges the EU to counter the criminalisation of the use of encryption, anti-censorship and privacy tools by refusing to limit the use of encryption within the EU, and by challenging third-country governments that criminalise such tools;
By developing a storage area for trusted certificates,you or a member of your workgroup can facilitate the use of encryption in the workgroup.
Counter the criminalisation of the use of encryption, anti-censorship and privacy tools by refusing to limit the use of encryption within the EU, and by challenging third-country governments that criminalise such tools.
When personal information is transmitted to other Web sites,it is protected through the use of encryption, such as the Secure Socket Layer(SSL) protocol.
Organizations can reduce their risks of cyber attacks by following industry best practices andimplementing key defense measures such as employee training and the use of encryption.
Urges the EU to counter the criminalisation of human rights defenders' use of encryption, censorship-bypassing and privacy tools,by refusing to limit the use of encryption within the EU, and to challenge third-country governments that level such charges against human rights defenders;
For example, we store the personal data you provide on computer servers with limited access that are located in controlled facilities, and when we transfer certain highly confidential or sensitive personal information,we protect it through the use of encryption.
Specific safeguards are needed, such as the accountability of data controllers for multi-national data exchange and the use of encryption for more sensitive data.
When personal information(such as a credit card number) is transmitted to other Web sites,it is protected through the use of encryption, such as the Secure Socket Layer(SSL).
Additionally, if we transmit sensitive personal information(such as a credit card number) over the Internet,we protect it through the use of encryption, such as the Secure Socket Layer(SSL) protocol.
Additionally, if we transmit sensitive personal information(such as a credit card number) over the Internet,we protect it through the use of encryption, such as the Secure Socket Layer(SSL) protocol.
ASBISC meets accepted standards of security for all transactions that may involve payment of fees through a service available through this site,including the use of encryption and SSL services.
ASBISC meets accepted standards of security for all transactions that may involve payment of fees through a service available through this site,including the use of encryption and SSL services.
Each Party may, in urgent circumstances, make requests for mutual assistance or communications related thereto by expedited means of communication, including fax or e-mail, to the extentthat such means provide appropriate levels of security and authentication(including the use of encryption, where necessary), with formal confirmation to follow, where required by the requested Party.
They include the use of acknowledged encryption methods(SSL or TLS).