Examples of using Identification and authentication in English and their translations into Spanish
{-}
-
Official
-
Colloquial
Cookies and personalization techniques: identification and authentication, navigation, interface customization, favorites.
The Mission has implemented identification and authentication controls and secure wireless access to ensure that the system is able to identify and differentiate among users.
properly document identification and authentication procedures.
properly document identification and authentication procedures.
A separate proposal was made in relation to that subparagraph, namely to delete the phrase"including any other identification and authentication methods.
use of these applications may involve the identification and authentication of the user(login/password) on the corresponding platforms,
The discussion highlighted that the low-value of the transactions and the need for speedy resolutions indicated that complex identification and authentication provisions(paras. 28-31 of A/CN.9/WG. III/WP.105) might not be necessary.
Activating and using these apps may cause the identification and authentication of the user(login/password) on the corresponding platforms,
Identification and Authentication for Each Role[e107] Identification and authentication of CAA/PA, SA,
it was further indicated that different levels of identification and authentication might be appropriate in light of the different roles of the parties involved in the transfer of the negotiable electronic records.
Having heard a suggestion that identification and authentication in ODR proceedings should be consistent with the work undertaken by Working Group IV on electronic commerce,
The second level is the provision of identification and authentication mechanisms that ensure that the person accessing the system
and">article 4B(2)(g)) with the phrase"signature or other means of identification and authentication.
for further legal analysis: contractual performance at the identification and authentication stages; privacy;
As with annex A, paragraph(e), it was agreed to insert the phrase"including any other identification and authentication methods" at the end of the paragraph.
forge-proof identification and authentication methods, and field-level monitoring e.g.
properly document identification and authentication procedures.
It was proposed to delete the phrase"including any other identification and authentication methods"(A/CN.9/WG. III/WP.127, para. 62) on the basis that that text was redundant with the term"signature", which, as used in UNCITRAL texts on e-commerce included other identification and authentication methods.
it was noted that other techniques might be found to provide useful identification and authentication methods in a variety of situations where such a high degree of legal certainty was not needed.
contingency planning, identification and authentication, incident response,