Examples of using Sensitive data in English and their translations into Croatian
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
You are responsible for the personal information stored in your phone- please erase all personal and sensitive data on the device before sending it to OnePlus.
For work with sensitive data, Smart Search Engine can be configured for use in any closed environment- confidently display results only within your own organization.
model attempts to avoid collecting sensitive data, such as fields flagged as containing password
It is still not known how exactly the sensitive data has been exposed, yet the researchers could trace it back to Vietnam.
the Commission should preserve the confidentiality of commercially and/or strategically sensitive data and information.
lose potentially sensitive data.
This data governance is an important aspect of overall information protection, because if sensitive data persists in the environment longer than necessary,
Your sensitive data and/ or personal data you have entered on our Website is encrypted
Insulated core independently transmits and manages sensitive data, keeping them at the same time completely safe.
Also, the introduction of this standard can significantly help to comply with legal requirements in protecting sensitive data, information systems,
This setting is useful when you want to prevent sensitive data from appearing in search results.
were forced to hand over sensitive data, there would be nothing to come after.
With BizDataX they can make sure that sensitive data is protected
An isolated system core independently transmits and manages sensitive data, keeping them completely secure the entire time.
Although virtual, Personal Vault will allow OneDrive users to classify certain documents under high protection by positioning this sensitive data in a space that will be secured by double-factor authentication.
Essity is taking all necessary steps to protect such sensitive data as legally required.
All the sensitive data gathered in the campaign will then be transferred to the attackers' email inbox.
In addition, they can help in the implementation of policies to secure access to sensitive data through a scalable platform.
their delegated entities shall each preserve the confidentiality of commercially and/or strategically sensitive data or information in their possession.
You are responsible for the personal information stored in your phone- please erase all personal and sensitive data from the device before sending it to OnePlus.