Sentences with phrase «preventing unauthorised access»

It justifies this final claim — that the E-Privacy Directive includes data access legislation — on the (weak) grounds that recital 21 of the directive stipulates that the directive's aim is to protect confidentiality by preventing unauthorised access to communications, including «any data related to such communications» [77].
They can also provide a means of preventing unauthorised access to playgrounds during school hours.
4.2.6 — The Customer is responsible for maintaining the confidentiality of his / her Bitit Account and password and for restricting access to his / her computer to prevent unauthorised access to his / her Bitit Account and should inform Bitit immediately if he / she has any reason to believe that his / her password has become known to anyone else, or if the password is being, or is likely to be, used in an unauthorised manner.
As a registered Member, you are responsible for maintaining the confidentiality of your account and password and for restricting access to your computer to prevent unauthorised access to your account.
For example, we set strict security standards to prevent any unauthorised access to your personal information once we have received it and wherever possible we will use adequate security software and working procedures to ensure the security of your personal information.
Pilgrim said: «Password encryption is a basic security strategy that may prevent unauthorised access to user accounts.
«Password encryption is a basic security strategy that may prevent unauthorised access to user accounts.
This can be alarms that activate when there is an issue and are responded to, staff carrying out patrols of school grounds when an intruder has been spotted, fences that are built and gates that are secured, to prevent unauthorised access, and keep the children and staff secure.
Once we have received your information, we will use strict procedures and security features to try to prevent unauthorised access.
In order to prevent unauthorised access or disclosure, we have put in place suitable physical, electronic and managerial procedures to safeguard and secure the information we collect online.
4.3 If the User's access to the App is terminated or suspended, Auto & General reserves the right to exercise whatever means Auto & General deem necessary to prevent unauthorised access to the App, including, but not limited to, technological barriers, IP mapping etc..
In order to prevent unauthorised access or disclosure, we have put in place suitable physical, electronic and managerial procedures to safeguard and secure the information we collect online.
The protected drive will prevent unauthorised access to backup files on that drive if the local PC creates backups to the protected volume.
The Office 365 users will be able to keep their information secure and private by setting a password to access a shared file or folder to prevent any unauthorised accessing of files.
Once we have received your information, we will use strict procedures and security features to try to prevent unauthorised access
(ii) any record of the family dispute resolution is stored securely to prevent unauthorised access to it; and

Not exact matches

Wireless network security is an important consideration here too, to prevent access from unauthorised users and devices.
6.1.3 Auto & General shall take appropriate and reasonable technical and organisational measures to prevent the loss of, damage to or unauthorised destruction of Data and the unlawful access to or processing of Data.
It is your responsibility to ensure that you take appropriate care of these details to prevent unauthorised persons from accessing your account and you must tell us in writing if you become aware that someone has gained unauthorised access to your details.
The starting point for cyber crime is the Computer Misuse Act 1990 (CMA 1990) which provides four different types of cyber offences: unauthorised access to a computer simpliciter; unauthorised access with intent to commit or facilitate serious crime; unauthorised modification of computer intending / being reckless as to impairing its operation, preventing or hindering access to a program or data; and making, supplying or obtaining articles to use to commit CMA 1990 offences.
relating to data protection (for example, to prevent damage, or unauthorised or unlawful access, to relevant data);
Our protective steps to prevent misuse, interference, loss, unauthorised access, modification or disclosure of your information include:
a b c d e f g h i j k l m n o p q r s t u v w x y z