它还通过建立防止数据滥用的标准来解决保护隐私权问题。
It also addresses concerns over privacy rights by establishing standards protecting data from misuse.
我们还依赖操作系统提供的机制来保护操作系统资源不被滥用。
We also rely on operating systems to provide mechanisms to protect operating system resources from abuse.
但是,我们在过去两年中看到的是,如果没有合理的、清晰明确的规则去检查滥用,保护家庭,市场不能自由运行。
But what we have seen over the past two years is that without reasonable and clear rules to check abuse and protect families, markets don't function freely.
社交网络应用程序不仅应该提供有用的特性,还应保护用户的信息不被滥用。
A social network application should not only provide useful features, but also protect people's information from abuse.
男同性恋者的健康问题的范围可以从性传播疾病和滥用物品,到抑郁症和身体形象问题。了解这些重大健康风险,认识如何保护你自己。
Health issues for gay men may range from STDs and substance abuse to depression and body image problems. Understand these important health risks and know how to protect yourself.
还依赖操作系统提供的机制来保护操作系统资源不被滥用。
You also rely on operating systems to provide mechanisms to protect operating system resources from abuse.
欧盟必须设计出条规来限制它被滥用,尤其是在金融领域或者如一布鲁塞尔的官员说:“我们将会看到保护主义和民粹主义的抬头”。
The EU must craft regulation that is seen as stopping abuses, especially in the financial sector, or "we will see the rise of protectionism and populism," says a senior Brussels official.
其主要职责是保护人民免于不公平和滥用的借贷行为。
It would be responsible for protecting people from unfair and abusive practices with borrowing and investing.
本案是《联邦电脑欺诈与滥用法案》继续延伸使用的重要一步,这样才能保护公众免受计算机犯罪的危害。
This case will be simply another important step in the expanded use of this statute to protect the public from computer crime.
它保护组织遭到破坏,使细胞减少适当的压力,同时释放出引起疼痛的化学物质来防止相关部位持续的“过度使用和滥用”。
It prevents rapid tissue destruction by allowing for cellular adaptation to the stress as well as the release of pain-causing chemicals to prevent continued "overuse and abuse" of the involved part.
如果只是有钱人才能使用(或滥用)知识产权制度,那保护知识产权的制度就毫无意义了。
A system to protect intellectual property is meaningless if only the rich can use (or abuse) it.
但仅仅是透明化是远远不够的:举例而言,它不能阻止滥用权力,也无法阻止保护主义。
But transparency alone gets you only so far: it does not, for example, stop abuse or protectionism.
比罗告诉我,这种保密是为了保护自己客户的隐私并防止任何人滥用指纹。
Biro told me that such secrecy protected the privacy of his clients and prevented anyone from misusing the fingerprint.
你不能仅仅因为手机包含有益的技术就说可以撤掉那套保护孩子们和教职员工不滥用手机的系统了。
You can't just say that because the phones contain useful technology, you remove the systems in place to protect children and staff from the abuse of them.
坦率地说,大多数能力是危险的,可能被滥用,减少攻击者可以利用的能力有助于保护系统。
Admittedly, most of the capabilities are dangerous and can be abused, but reducing the capabilities available to an attacker might well protect your system from harm.
完善的安全功能能够保护APIs避免被滥用,并确保用户数据隐私。
Sophisticated security capabilities to help protect the APIs from abuse and ensure the privacy of customer data.
而如果对权利不加约束又会造成滥用,所以对滥用反诉权进行的恶意反诉进行相应的规制,是对反诉进行保护的应有之意。
If without the right to be caused by abuse, the right to counterclaim for malicious abuse counterclaim for the corresponding regulations system is due to the protection of counterclaim.
免于作为完整的数据保护,用户盗窃威胁被滥用的保障。
Frees the User from the Threat of Theft as Full Protection of Data from being Misused is guaranteed.
在利益平衡下技术措施保护的制度设计上,版权滥用原则的运用将有助于保障使用者的诸如合理使用、表达自由等非侵权性使用。
Concerning about the institutional design of TM under interest balance, the copyright abuse doctrine can uphold the user right to non-infringement use such as fair use and expression freedom.
如何保护地理标志不被滥用,如何有效地禁止假冒侵权行为等问题已成为国际社会和各国立法机关所共同关注的问题。
Therefore, the problem that how to prevent geographical indication from being abused and ban the counterfeiting effectively has attract the attention of the specialists all over the world.
在防滥用系统保护下,全新的存储系统让您咋都不用删除电子邮件!
Protected by responsive anti-abuse controls, this updated storage system gives you the option to never delete another email!
支持保护动物的工作;不滥用动物做实验。
Support animal protection projects; do not abuse animals for experimentation.
因而,匿名系统能在提供匿名保护的同时,有效地防止匿名滥用。
Therefore, anonymous communication system can not only provide anonymous protection but also prevent anonymity abusing.
因而,匿名系统能在提供匿名保护的同时,有效地防止匿名滥用。
Therefore, anonymous communication system can not only provide anonymous protection but also prevent anonymity abuse.
描述信息技术保全政策和程序,对密码保护和识别滥用不当访问,篡改或改变业务数据的程序。
Describe the it security policies and procedures for password protection and to identify the abuse of improper access, tampering or the altering of business data.
传统私法在对商业秘密保护的力度上受限于私法救济,在对滥用商业秘密权的制约上更是鞭长莫及。
The traditional private law only protect trade secrets in the way provided by civil law and cannot restrict the misuse of trade secrets.
传统私法在对商业秘密保护的力度上受限于私法救济,在对滥用商业秘密权的制约上更是鞭长莫及。
The traditional private law only protect trade secrets in the way provided by civil law and cannot restrict the misuse of trade secrets.
应用推荐