英語 での Data leakage の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
The software provides a high level of protection in order to prevent the data leakage.
If you are sending it with a contact, make sure you have logged in to your iCloud account to avoid data leakage.
The Bank is taking necessary and appropriate action for the security control to avoid data leakage, loss or damage of customers' Personal Information, etc.
We take reasonable safeguards to prevent danger of data leakage, loss, misuse, alteration, unauthorized access.
Data leakage from the MDX framework 614 may be prevented in other ways.
Defining proper access controls is ultimately one of the best ways to prevent data leakage.
Then Facebook said that this mechanism is a built-in process to protect information from drivers, preventing subsequent data leakage.
This tight integration improves usability, but also requires measures to prevent any data leakage.
Premently shred files and folders on local Mac avoid data leakage.
Such a solution would protect a user not to download malicious code or for preventing data leakage.
The built-in defense ensures that you don't share to social media by accident, and provides a bunch of privacy options to prevent data leakage.
Spying on Email is of great significance for employers to catch insider threats and prevent confidential data leakage.
Without a robust access control policy, organizations risk data leakage from both internal and external sources.
Unlike traditional laptop computers, data leakage on mobile devices can be a profound risk.
Prevention: Threat Intel can help prevent data leakage by blocking communications with C&C infrastructures.
Using personal file sharing services for business purposes invites data leakage and compliance violations, allowing files to escape beyond the visibility and control of IT.
Centralized storage of unencrypted data involves high risks of account hacks, data leakage and theft as well as data disclosure to third parties.
Rather, its primary objective is to increase user awareness and avoid accidental loss scenarios, so it outlines the requirements for data leakage prevention.
TCG Opal handles the encryption/decryption of information within the device without requiring a host, enabling fast encryption/ decryption and minimizing the risk of data leakage without undermining system performance.
The need to keep data safe is becoming more and more important, especially in the context of data leakage, unlimited data collection or computer attacks of any kind.