Examples of using Access to sensitive in English and their translations into Dutch
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Computer
-
Ecclesiastic
-
Official/political
-
Programming
execute code on behalf of the user- granting access to sensitive user information not limited to Evernote's domain,- reported Guardio specialists.
thwart attacks before the wrong people can gain access to sensitive information.
that a malicious insider is selling access to sensitive source code,
more detailed framework regulating Parliament's access to sensitive Council documents.
has progressed a range of actions necessary for the implementation of the register and restricting access to sensitive information,” Telstra stated in its response to the ANAO's report last year.
As for the alleged failure to grant access to sensitive documents, the Ombudsman considered that the complainant had not submitted any evidence to rebut the Council's statement that no sensitive documents of relevance to the subject matter concerned by the complainant's request did exist,
Recording of, and access to, sensitive documents.
Some use the time zone control in order to be able to monitor temporary accesses to sensitive building areas- others don't.
Telepresence giving access to sensitive zones.
Manage access to sensitive information and functions.
Access to sensitive information will be granted on a need-to-know basis.
Control of access to sensitive areas of airports and aircrafts;
User authentication to ensure that only authorised people have access to sensitive information.
Dr. Vance, I'm authorizing Agent DiNozzo access to sensitive, compartmented information.
Her calls could be encrypted for security reasons. And if she has access to sensitive information.
Director Vance, I'm authorizing Agent DiNozzo access to sensitive compartmented information commensurate with the Black Program.
This prevents unauthorised access to sensitive facilities in the cabinet.
This user right provides complete access to sensitive and critical operating system components.
For instance, the company could suffer if hackers successfully gained access to sensitive data.
prevent unauthorised users from gaining access to sensitive information.