Dictionnaire français - anglais

informatique et traitement des données - iate.europa.eu
veiller de façon raisonnable à ce quaucun manquement à la sûreté ne soit commis par la ou les personnes accompagnées.

reasonably ensure that no security breach is committed by the person or persons being escorted.

protection sociale - eur-lex.europa.eu
obtenir l'assurance raisonnable qu'aucun manquement à la sûreté n'est commis par la ou les personnes accompagnées.

reasonably ensure that no security breach is committed by the person or persons being escorted.

général - CCMatrix (Wikipedia + CommonCrawl)
d) obtenir l'assurance raisonnable qu'aucun manquement à la sûreté n'est commis par la ou les personnes accompagnées.

reasonably ensure that no security breach is committed by the person or persons being escorted.

général - CCMatrix (Wikipedia + CommonCrawl)
veiller de façon raisonnable à ce qu’aucun manquement à la sûreté ne soit commis par la ou les personnes accompagnées.

reasonably ensure that no security breach is committed by the person or persons being escorted.

général - CCMatrix (Wikipedia + CommonCrawl)
veiller de façon raisonnable à ce qu’aucun manquement à la sûreté ne soit commis par la ou les personnes accompagnées.

reasonably ensure that no security breach is committed by the person or persons being escorted.

général - CCMatrix (Wikipedia + CommonCrawl)
Physiological signals: the next generation authentication and identification methods!?Throughout the last 40 years, the security breach caused by human error is often disregarded....
informatique et traitement des données / information et traitement de l'information / prix - core.ac.uk - PDF: doc.utwente.nl
Abstract title of thesis: on random additive perturbation for privacy preserving data mining... It points out the possible breach of privacy using random additive perturbation....
Breach of personal security through applicative use of online social networksAbstract- Throughout this article there is an attempt to indicate the threats of potential to breach of personal security through applicative use of internet as well as applicative use of online social networks....
manquement à la sûreté
informatique et traitement des données - iate.europa.eu
Kelsen, the principle of exclusion of contradictions, and general anti-­avoidance rules in tax law... For most of his scholarly life, Kelsen argued that, as part of the pure theory, two norms that contradict one another within the same legal system breach the philosophical principle of exclusion of contradictions and therefore cannot both be valid at the same time....
général - core.ac.uk - PDF: core.ac.uk
Phase ib trial of mutant herpes simplex virus g207 inoculated pre-and post-tumor resection for recurrent gbm... Inclusion criteria were histologically proven recurrent malignant glioma, Karnofsky score ≥70, and ability to resect the tumor without ventricular system breach....
informatique et traitement des données - iate.europa.eu
Internal threats on information system security in iraq hospitals... This paper analyze the internal organizational human factors that could cause an information security breach in Iraq hospitals....
informatique et traitement des données / politique internationale / santé - core.ac.uk - PDF: eprints.utm.my
Spout: a transparent distributed execution engine for java applets... Despite an array of security checking, detection, and enforcement mechanisms built into the language model, the compiler, and the run-time system of Java, serious security breach incidents due to implementation bugs have been reported in the past several years....

Publications scientifiques

Hardware-supported oram in effect: practical oblivious search and update on very large datasetThe ability to query and update over encrypted data is an essential feature to enable breach-resilient cyber-infrastructures....
information et traitement de l'information / informatique et traitement des données - core.ac.uk - PDF: www.degruyter.com
Impact of eu-gdpr on local authorities in england : an investigation into how the introduction of new eu data protection legislation will affect local authorities in the uk and what the key changes will be that this new law will force on these organisations.... Studies conducted by the ICO and Big Brother Watch identified major problems in some local authorities with breaches of the Data Protection Act resulting in considerable fines totalling in the millions....
information et traitement de l'information / informatique et traitement des données / communication - core.ac.uk - PDF: shura.shu.ac.uk
Is comprehensive federal data security legislation necessary to protect u.s. businesses, consumers and the government from identity theft and other crimes?...theft.This thesis finds that a national standard for data security breach notification,credit freeze policy, and social security number safeguards would be beneficial becauseof confusing state laws....
information et traitement de l'information / informatique et traitement des données - core.ac.uk - PDF: jhir.library.jhu.edu
Security breach notice report... This report provides a summary of the Act and an overview of the security breach notices received by the South Carolina Department of Consumer Affairs
général - core.ac.uk - PDF: core.ac.uk

Exemples français - anglais

Traductions en contexte français - anglais

Un manquement à la sûreté peut en effet très vite devenir un problème de sécurité.

In addition, winter conditions can quickly become a safety concern.

général - CCMatrix (Wikipedia + CommonCrawl)


1 milliard de traductions classées par domaine d'activité en 28 langues