Examples of using Authentication procedure in English and their translations into French
{-}
-
Official
-
Colloquial
Regardless of the entry point into the Clearinghouse, the authentication procedures established will be uniform.
com had used"social engineering" to successfully circumvent the customer authentication procedures of Bell and TELUS Mobility.
CCRs receive training on authentication procedures as part of their initial employee training.
Therefore, the bank bears all the risk of an unauthorized payment order when the authentication procedures are not at a minimum"commercially reasonable.
The Assistant Commissioner concluded that the companies' authentication procedures and staff training were not sufficient to adequately protect customer information
Authentication procedures embedded in the process of creation,
Not only would an intruder on the system have to simulate the authentication procedures. but he would have to do so on a line normally used by an authorized user.
the acceptability of digital signatures and other authentication procedures used in commercial transactions,
arise should be accepted, in view of the need for preserving the reliability of agreed authentication procedures.
registrant pre-verification, or authentication procedures, or other covenants.
led to simple and cost effective data transmission possibilities on a world-wide level with increasingly secure authentication procedures.
payment mechanisms, and authentication procedures.
a brute force attack, you must check the effectiveness of your authentication procedures and implement measures that guarantee secure access to the network.
Authentication procedures embedded in the processes of creation,
exploit weaknesses of security functions such as authentication procedures, data access control, cryptographic operations.
takedown procedures, registrant pre-verification, or authentication procedures, or other covenants.
led to simple and cost effective data transmission possibilities on a world-wide level with increasingly secure authentication procedures.
simplifying and expediting authentication procedures for access to services.
to electronic data transfers; mandatory data access authentication procedures were laid down along with the use of data storage
information given out to callers over the phone, and that they improve authentication procedures consistent with the identification and authentication guidance issued