Examples of using Unauthorised processing in English and their translations into Slovenian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Computer
-
Official/political
-
Programming
All published instruments are also linked to a time stamp,which enables any cases of unauthorised processing to be detected.
Prevent the unauthorised processing of data in the EES and any unauthorised modification or deletion of data processed in the EES;
The following safeguards are used, for example, to protect your personal data from misuse or any form of unauthorised processing:.
(e)prevent the unauthorised processing of data in the ECRIS-TCN system and any unauthorised modification or deletion of data processed in the ECRIS-TCN system;
For example, the following security measures are used to protect your personal datafrom misuse or other unauthorised processing:.
(ea) prevent the unauthorised processing of data in SIS and any unauthorised modification or erasure of data processed in SIS(control of data entry);
The following security measures are used to protect your personal data against misuse orany other form of unauthorised processing:.
(f) prevent the unauthorised processing of data in Eurodac and any unauthorised modification or erasure of data processed in Eurodac(control of data entry);deleted.
By way of example, the following security measures are used to protect your personal data against misuse or any other form of unauthorised processing:.
The essential measures which have been undertaken within Centaur Trust to avoid unauthorised Processing of Personal Data include, among other things;
Prevent the unauthorised processing of data in the EES and any unauthorised modification or deletion of data processed in the EES(control of data entry);
For example, the following security measures are used to protect personal data against unauthorised use orany other form of unauthorised processing:.
(e) prevent the unauthorised processing of data in the Central Repository and any unauthorised modification or deletion of data processed in the Central Repository(control of data entry);
All the prescribed procedures and measures to protect personal data andprevent unauthorised processing of such data are in place, thereby ensuring:.
Applies organisational, technical, and other relevant processes as well as measures to prevent an unauthorised destruction of data,their changes, loss, or unauthorised processing.
We have adopted the technical and organisational measures necessary to ensure the security of the personal data we collect, use and maintain, and prevent their alteration,loss, unauthorised processing or access, having regard to the state of the art, the nature of the data stored and the risks to which they are exposed by virtue of human action or physical or natural environment.
In order to protect personal data, Foreach Labs will use all the technical and other suitable measures necessary to prevent unauthorised data destruction, modification,loss or any unauthorised processing.
According to this, the Company Transformation Lighthouse will provide that adequate measuresare accepted which will act against illegal or unauthorised processing of personal data and against accidental loss or damage to personal data.
For personal data protection purposes, the administrator will implement organizational, technical, and other appropriate procedures and measures to prevent unauthorised data deletion, change, loss, or unauthorised processing.
The administrator guarantees that it has adopted all prescribed procedures and measures for personal information protection, prevention of inadvertent or deliberate unauthorised destruction of this information,its modification or loss or unauthorised processing of this information, by making sure that:.
IZUM is implementing organisational and technical procedures and measures to ensure the protection of personal data and to prevent accidental or intentional unauthorised destructionof data or their alteration, loss or unauthorised processing.
In order to protect personal data, Eligma will use all the organisational, technical and other suitable procedures and measures necessary to preventunauthorised data destruction, modification, loss or any unauthorised processing.
The company shall ensure the security of personal data using the appropriate legal, organisational and logical and technical procedures and measures for the prevention of the accidental or intentional destruction, modification,loss or unauthorised processing of the data, namely by:.
(1) Security of personal data comprises organisational, technical and logical-technical procedures and measures to protect personal data, and to prevent accidental or deliberate unauthorised destruction,modification or loss of data, and unauthorised processing of such data:.
(33) In such a case, the U.S. organisation must also take reasonable and appropriate steps(i) to ensure that the agent effectively processes the personal information transferred in a manner consistent with the organisation's obligations under the Principles and,(ii)to stop and remediate unauthorised processing, upon notice.
The protection of users' personal data includes organisational, technical and logical-technical procedures and measures to protect personal data, to prevent the accidental or intentional unauthorised destruction of data, the modification of data, the dissemination of data to third parties,and the loss or unauthorised processing of data.
Taking appropriate technical, physical, and organisational measures to prevent unauthorised access,unlawful processing, and unauthorised or accidental loss, destruction, or damage to personal information.
They should prevent unauthorised or unlawful processing.
Article 37 Liability for unauthorised or incorrect processing of data.
Article 47 Liability for unauthorised or incorrect processing of data.