Приклади вживання Unauthorised access Англійська мовою та їх переклад на Українською
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
security features to try to prevent unauthorised access.
in order to prevent unauthorised access to, or disclosure of, the personal data.
Is self-explanatory, but it should be noted that security considerations cover issues such as unauthorised access to facilities, site
Web-based submission systems must be run in a way that prevents unauthorised access.
disclosure of your Information so as to prevent unauthorised access by third parties.
loss, and unauthorised access or disclosure.
in order to avoid unauthorised access to your user account.
We will use strict procedures and security features to try to prevent unauthorised access to your information within our control and possession.
Where possible, we may utilize security measures to prevent unauthorised access to our cookies and similar technologies.
Dixons Carphone's review of data and its systems disclosed massive unauthorised access to 5.9 million customer cards
Dixons Carphone has revealed a major data breach involving unauthorised access to 1.2 million of its customers' personal records and 5.9 million payment cards.
Dixons Carphone has revealed a major breach of data involving unauthorised access to 5.9 million customers cards and 1.2 million personal records.
Guaranteed security level- high data protection again unauthorised access using certified cryptographic tools.
security features to prevent unauthorised access.
The data supplying and receiving Contracting States shall be obliged to take effective measures to protect the personal data supplied against unauthorised access, unauthorised alteration
disclosure of information which you have given us, to prevent unauthorised access in accordance with Irelands data protection legislation.
technical measures to protect the User's information from unauthorised access by third parties,
We may put in place such systems as we from time to time see fit to prevent automated programs being used to obtain unauthorised access to our system and this website.
alteration of data or unauthorised access, taking into consideration the risk presented by the processing
procedures to protect your Data from unauthorised access and use, accidental