To protect the integrity of the information contained in this record, you should not disclose or otherwise reveal your password to third parties.
为了保护您的信息的完整性,您不应该向第三方公开您的密码。
The first is to ensure open and transparent information, in particular to ensure the integrity of the information, to establish a strong mechanism to deal with the crisis.
一是在保证信息公开透明的情况下,又要特别保证信息的完整性,建立强力的危机应对机制。
These institutions must guarantee that the integrity, confidentiality, and availability of electronic health information that they collect, maintain, use, and transmit is protected.
这些机构必须保证:他们收集、维护、使用和传输的电子健康信息的完整性、机密性和可用性。
New principles for an age of big data sets will need to cover six broad areas: privacy, security, retention, processing, ownership and the integrity of information.
对于大数据集时代的新原则需涵盖以下六个广泛的领域:隐私、安全、产权保持力、处理、拥有和信息的完整性。
The CIA triad is a widely used information assurance (ia) model that identifies confidentiality, integrity, and availability as the fundamental security characteristics of all information systems.
CIA三部曲是广泛使用的信息保证(Information Assurance,IA)模型,此模型将保密性、完整性和可用性定义为所有信息系统的基础安全特征。
Require the operator of such a website or online service to establish and maintain reasonable procedures to protect the confidentiality, security, and integrity of personal information collected.
要求上述网站或者在线服务运营商设立和遵守保护所采集的个人信息的秘密性、安全性和完整性的合理程序。
We believe, from the point of information integrity, this restriction can be relaxed to reversible matrix.
我们认为,从信息完整的角度考虑,可以将这个条件放宽到可逆矩阵。
The code in Listing 2 demonstrates another use of the Geocoder's result information-a data-integrity check.
清单2中的代码演示了Geocoder结果信息的另一种使用方法—数据完整性检查。
Information security is refers to the accuracy of the information, and authenticity, confidentiality, integrity, and availability and the protection of utility.
信息安全则是指对信息的精确性、真实性、机密性、完整性、可用性和效用性的保护。
Follow up the equipment installation & commissioning, feedback problems in time, collect equipment information and confirm the integrity of electric information and file up in time.
跟踪设备安装调试及时反馈问题点,收集设备资料,确认设备电气资料的完整并及时归档。
The adoption of the proposed, analysis, the solution to the problem that exists in reality postgraduate integrity deficiencies provide valuable information.
本文通过问题的提出、分析、解决,希望为现实存在的研究生诚信缺失问题提供有价值的参考。
This paper proposes a BOM mapping approach in order to maintain the integrity and accuracy of the information in product model.
为了有效地保证生命周期中的产品信息的完整性和正确性,该文给出了BOM视图的映射转换方法。
Although this Safetygram addresses connections only for industrial compressed gas service and ultra-high-integrity gas service, much of this information also applies to the other two groups.
尽管本安全程序只说明用于工业压缩气体设施和超高纯度气体设施的接头,这些资料中的许多也适用于其它两组接头。
Fully taking the characteristics of workflow management system into account, it works well to keep information secrecy, integrity and availability.
它充分考虑了工作流管理系统的特点,能够很好地保证信息的秘密性、完整性和可用性。
The IBIS model is used to help get exact information in the integrity constraint design of system board level or multiple board level signals for analysis and calculation.
IBIS模型可以帮助设计者在系统板级或多板信号完整性约束的设计中获取准确的信息,以进行分析和计算。
The director or legal representative of that financial institution shall guarantee the genuineness, accuracy, integrity and timeliness of the disclosed information.
金融机构的董事或法定代表人应当保证所披露的信息真实、准确、完整、及时。
Thus, the integrity, authorization and authentication of digital medical information being used in hospitals, were ensured.
由此保证了医学数字信息在院内使用的完整性、认可性和可鉴证性。
It would also include the control and integrity of regulatory, documentation, environmental, health and safety regulations, and SOP information such as corrective action procedures.
它也将包括控制和管理,文档,环境,健康和安全法规的完整性,如纠正行动程序和SOP的信息。
Access control is an important component of network security, E-Govment in the protection of information integrity, confidentiality and availability play an important role.
访问控制是网络安全的一个重要组成部分,在保障电子政务信息的完整性、保密性和可用性方面发挥着重要作用。
Integrity is one of the objectives related to information system security, this paper presents a model to specify integrity policies for temporal database management system.
数据完整性是信息系统的安全目标之一,该文描述了一个时间相关的数据库管理系统的完整性策略模型。
Digital signature has been playing a very important role in the fields of information security, identity authentication, data integrity, nonrepudiation and anonymity, etc.
数字签名已经在信息安全、身份认证、数据完整性、不可否认性以及匿名性等方面发挥了重要作用。
Make sure the information assets of the confidentiality, integrity, availability and legality, and comply with regulations, avoid suffering internal and external threat of.
确保资讯资产的机密性、完整性、可用性及适法性,并符合相关法规之要求,使其免于遭受内、外部之威胁。
The results show that the algorithm can provide integrity, in time accurate, comprehensive decision information, and realize the purpose of general decision support service.
证实该方法可以提供给高层决策者完整、及时、准确、立体多方位的决策信息,达到了提供全面决策支持服务的目的。
A secure application protects the confidentiality, integrity, and availability of the customers' information.
一个安全的应用程序应可保护客户信息的机密性、完整性和可用性。
The signature scheme can verify the authenticity, integrity and undeniableness of a document, and signature scheme is the important content that information security studies.
签名计划可以用来验证身份的真实性、文档的完全性和不可否认性,是信息安全研讨的主要内容。
About how we use and protect the integrity of your personal information, please refer to the Privacy Policy.
对于我们如何使用和保护您的个人信息的完整说明,请参阅隐私权政策。
Digital signatures, one of the most important components of cryptography, are the basic theory for protecting the integrity and authenticity of information.
数字签名是密码学中重要的组成部分之一,是信息完整性、真实性的理论基础。
Digital signatures, one of the most important components of cryptography, are the base of theory for protecting the integrity and authenticity of information.
数字签名是密码学中重要的组成部分之一,是信息完整性、真实性的理论基础。
Digital signatures, one of the most important components of cryptography, are the base of theory for protecting the integrity and authenticity of information.
数字签名是密码学中重要的组成部分之一,是信息完整性、真实性的理论基础。
应用推荐