aon – -Translation – Keybot Dictionary

Spacer TTN Translation Network TTN TTN Login Deutsch Français Spacer Help
Source Languages Target Languages
Keybot 162 Results  www.inchblue.com  Page 7
  Prionsabail um Chosaint...  
Coimeád iad cruinn agus nuashonraithe agus scrios nó réitigh aon sonraí míchruinne gan mhoill;
Keep it accurate and up-to-date and erase or rectify any inaccurate data without delay;
  Cur chuige bunaithe ar ...  
Agus tú ag féachaint ar phróifíl riosca na sonraí pearsanta a phróiseálann d'eagraíocht, bheadh sé úsáideach breathnú ar na díobhálacha inláimhsithe do dhaoine aonair a gcaithfidh d'eagraíocht cosaintí a chur i bhfeidhm ina gcoinne.
When looking at the risk profile of the personal data your organisation processes, it is useful to look at the tangible harms to individuals that your organisation needs to safeguard against. These are detailed in Recital 75 of the GDPR and include processing that could give rise to: discrimination, identity theft or fraud, financial loss, damage to the reputation, loss of confidentiality of personal data protected by professional secrecy, unauthorised reversal of pseudonymisation; or any other significant economic or social disadvantage.
  Slándáil Sonraí | Data ...  
Tá balla dóiteáin ina bhunriachtanas i gcás go bhfuil aon nascacht sheachtrach ann, bíodh sí chuig líonraí eile nó chuig an Idirlíon. Tá sé tábhachtach go gcumraítear ballaí dóiteáin i gceart mar gur uirlis ríthábhachtach iad le haghaidh iarrachtaí rochtain neamhúdaraithe a fháil a chomhrac.
A firewall is essential where there is any external connectivity, either to other networks or to the internet. It is important that firewalls are properly configured, as they are a key weapon in combating unauthorised access attempts. The importance of firewalls has increased as organisations and individuals increasingly avail of "always-on" internet connections, exposing themselves to a greater possibility of attack.
  Próiseas Fógra Sháraith...  
Nóta do sholáthróirí líonraí nó seirbhísí cumarsáide leictreonaí atá ar fáil go poiblí: Ós rud é go gcuireann na Rialacháin (Líonraí agus Seirbhísí maidir le Cumarsáidí Leictreonacha) (Príobháideachas agus Cumarsáidí Leictreonacha) na gComhphobal Eorpach 2011 (IR 336 ó 2011) dualgais shonracha ar sholáthróirí líonraí nó seirbhísí cumarsáidí leictreonacha atá ar fáil go poiblí sláine a gcuid seirbhísí a chumhdach, sárú a thuairisciú ar son aon eagraíochta san earnáil seo, comhlánaigh, le do thoil, ár bhFoirm do sholáthróirí Teileachumarsáide/ISP faoi Fhógra Sáraithe Shláine Sonraí, foirm atá ar fáil ag dataprotection.ie/secur-breach/
Note for providers of publicly available electronic communications networks or services: Because the European Communities (Electronic Communications Networks and Services) (Privacy and Electronic Communications) Regulations 2011 (SI 336 of 2011) place specific obligations on providers of publicly available electronic communications networks or services to safeguard the security of their services, to report a breach on behalf of any organisation in this sector, please complete our Telecoms/ISP providers Data Security Breach Notification Form, available here
  Slándáil Sonraí | Data ...  
Is úsáideach atá an gníomhachtú uathoibríoch glasála sin mar nach mór don úsáideoir gníomh dearfach a dhéanamh gach uair a fhágann sé/sí an ríomhaire gan aon duine ina bhun i gcás nach mór stáisiún oibre a ghlasáil de láimh.
Most systems allow for screensavers to activate after a period of inactivity on a computer, requiring a password to re-establish access. This automatic lock activation is useful as the alternative manual locking of a workstation requires positive action by the user every time he/she leaves the computer unattended. Regardless of which method an organisation employs, computers should be locked when unattended. This applies not just to computers in public areas, but to all computers. It is pointless having an access control system in place if unattended computers may be accessed by any staff member.
  Slándáil Sonraí | Data ...  
Ní hé amháin go dteastaíonn bogearraí frithvíris chun ionfhabhtuithe ón Idirlíon (ionfhabhtuithe trí ríomhphost nó ionfhabhtuithe ón nGréasán araon) a chosc ach teastaíonn siad freisin chun víris a d’fhéadfadh teacht as feistí iniompartha amhail méaróga cuimhne (ar cheart a n-úsáid a theorannú go docht) a chosc.
Anti-virus software is not only required to prevent infection from the internet (either e-mail or web-sourced) but to prevent viruses that may also be introduced from portable devices, such as memory sticks (the use of which should be strictly limited). No anti-virus package will prevent all infections, as they are only updated in response to infections. It is essential that such software is updated on a regular basis and that policies support vigilance in regard to potential threats. A policy of not opening e-mail attachments from unexpected sources can be a useful way of preventing infection.
  Slándáil Sonraí | Data ...  
Ba cheart do rialaitheoirí sonraí a áirithiú go gcuirfear úsáideoirí ar an eolas gurb uathúil dóibh atá a bpasfhocal/a bpasfhrása agus nach ceadmhach é a nochtadh d’aon duine eile. Ba cheart do rialaitheoirí sonraí castacht agus fad na bpasfhocal a fhorfheidhmiú.
Data controllers should ensure that users are made aware that their password / passphrase is unique to them and must not be disclosed to anyone else. Data controllers should enforce password complexity and length. Shared credentials should never be permitted. Vendor supplied defaults for system passwords and other security parameters should never be left in place. Data controllers must ensure that partner organisations with access to their systems or data respect these controls.
  Slándáil Sonraí | Data ...  
Is úsáideach atá an gníomhachtú uathoibríoch glasála sin mar nach mór don úsáideoir gníomh dearfach a dhéanamh gach uair a fhágann sé/sí an ríomhaire gan aon duine ina bhun i gcás nach mór stáisiún oibre a ghlasáil de láimh.
Most systems allow for screensavers to activate after a period of inactivity on a computer, requiring a password to re-establish access. This automatic lock activation is useful as the alternative manual locking of a workstation requires positive action by the user every time he/she leaves the computer unattended. Regardless of which method an organisation employs, computers should be locked when unattended. This applies not just to computers in public areas, but to all computers. It is pointless having an access control system in place if unattended computers may be accessed by any staff member.
  Slándáil Sonraí | Data ...  
Nuair is féidir, is amhlaidh, sula suiteáiltear na paistí is déanaí, gur dea-chleachtas é na paistí sin a shuiteáil i dtimpeallacht tástála chun a áirithiú nach gcruthóidh na paistí aon fhadhbanna eile le do chórais.
Patches are the latest updates from the creator of your operating system software or application software. They usually contain fixes to potential security concerns and can be an important tool in preventing hacking or malware attacks. Organisations should ensure that they have regular, consistent and comprehensive patch management procedures in place. Where possible, before installing the very latest patches, it is good practice to install these patches in a test environment to ensure that the patches do not create other issues with your systems. A record should also be kept of the date and patch installed on a system.
  Slándáil Sonraí | Data ...  
Aidhm eile atá le córais den sórt sin is ea ionsaithe a dhéantar ó áiteanna laistigh den chóras a bhrath. Ba cheart d’aon eagraíocht a phróiseálann méideanna móra sonraí pearsanta córas braite ionróirí a bheith in úsáid agus gníomhachtaithe aige.
An intruder detection system (IDS) acts as an internal alarm system that monitors and reports on malicious activities on a network or system. Such systems also aim to detect attacks that originate from within the system. Any organisation processing large volumes of personal data should have an IDS deployed and activated. Where alerts/events are generated by any such systems there must be a meaningful system in place to examine them in a timely fashion. This is to assist in identifying unusual activity and take immediate corrective action if there is an ongoing breach of security.
  Slándáil Sonraí | Data ...  
Dá bharr sin, ba cheart córas a bheith in ann an t-ainm úsáideora a fuair rochtain ar chomhad agus am na rochtana sin a shainaithint. Ba cheart loga a chruthú freisin de na hathruithe a rinneadh, mar aon le hainm an údair/an eagarthóra.
Access control systems and security policies are undermined if the system cannot identify abuses. Consequently, a system should be able to identify the user name that accessed a file and the time of the access. A log of alterations made, along with author / editor, should also be created. Logs and audit trails can help in the effective administration of the security system and can deter staff members tempted to abuse the system. Staff should be informed that logging is in place and that user logs are regularly reviewed. Monitoring processes should focus not only on networks, operating systems, intruder detection systems and firewalls, but should include remote access services, web applications and databases.
  Slándáil Sonraí | Data ...  
Ní mór breithniú a dhéanamh ar na riachtanais dhifriúla atá ag gach ceann de na cineálacha sin úsáideora agus ba cheart na pribhléidí atá acu chun rochtain a fháil ar shonraí pearsanta a bheith ag teacht go hiomlán leis na riachtanais sin. Ba cheart an cineál rochtana a thugtar d’úsáideoir aonair a shocrú agus a athbhreithniú ar bhonn rialta.
Consideration must be given to the different requirements of each of these types of user and their access privileges to personal data should fully reflect these requirements. The nature of access allowed to an individual user should be set and reviewed on a regular basis. Individual staff members should only have access to data which they require in order to perform their duties. Specific procedures sometimes referred to as a "movers, leavers and joiners" policy are required in all organisations with access to personal data to increase or restrict previous access where a user role changes, prevent use of shared credentials (multiple individuals using a single username and password) and detect use of default passwords. This must be supported by regular reviews of actual access to ensure that all authorised access to personal data is strictly necessary and justifiable for the performance of a function.
  Slándáil Sonraí | Data ...  
Is úsáideach atá an gníomhachtú uathoibríoch glasála sin mar nach mór don úsáideoir gníomh dearfach a dhéanamh gach uair a fhágann sé/sí an ríomhaire gan aon duine ina bhun i gcás nach mór stáisiún oibre a ghlasáil de láimh.
Most systems allow for screensavers to activate after a period of inactivity on a computer, requiring a password to re-establish access. This automatic lock activation is useful as the alternative manual locking of a workstation requires positive action by the user every time he/she leaves the computer unattended. Regardless of which method an organisation employs, computers should be locked when unattended. This applies not just to computers in public areas, but to all computers. It is pointless having an access control system in place if unattended computers may be accessed by any staff member.
  Slándáil Sonraí | Data ...  
I ngach cás, ba cheart coinneáil agus macasamhlú sonraí a mheas in aghaidh an riachtanais ghnó agus iad a íoslaghdú, trí gan aon sonraí neamhriachtanacha a bhailiú nó trí shonraí a scriosadh a luaithe nach mbeidh siad ag teastáil a thuilleadh.
The most effective means of mitigating the risk of lost or stolen personal data is not to hold the data in the first place. Data retention and replication should always be assessed against business need and minimised, either by not collecting unnecessary data or by deleting data as soon as the need for it has passed. An example is organisations manually collecting full credit card details including expiry date and CVV number and storing such information beyond the processing of the transaction. A data controller 1should always know what data it holds, where it is held and how it flows through the organisation. Without this oversight, effective protection of personal data within the organisation is a difficult task.
  Slándáil Sonraí | Data ...  
Cé nach leagtar amach san Acht um Chosaint Sonraí, 2018, ná sa Rialachán Ginearálta maidir le Cosaint Sonraí aon bhearta slándála sonracha nach mór do rialaitheoir sonraí nó do phróiseálaí sonraí a bheith i bhfeidhm acu, leagtar amach i Rialacháin na gComhphobal Eorpach (Líonraí agus Seirbhísí Cumarsáide Leictreonaí) (Príobháideachas agus Cumarsáid Leictreonach), 2011, roinnt ceanglas a bhaineann go sonrach leis an earnáil seirbhísí cumarsáide leictreonaí.
The Data Protection Act 2018 and the GDPR do not detail specific security measures that a data controller or data processor must have in place, though the European Communities (Electronic Communications Networks and Services) (Privacy and Communications) Regulations 2011 detail some requirements specific to the electronic communications services sector. The GDPR (Article 32(1)) does however place an obligation on controllers and processors to implement 'appropriate technical and organisational measures' to ensure a level of security appropriate to the risk, taking into account; the state of the art; the costs of implementation; the nature, scope, context and purposes of processing; and the likelihood and severity of the risk to the rights and freedoms of individuals. It goes on to suggest the following indicative list of appropriate measures;
  Aistriú sonraí pearsant...  
Cóid Iompraíochta a bhaineann le gníomhaíochtaí próiseála sonraí pearsanta ag rialtóirí agus próiseálaithe i níos mó ná Ballstát amháin den AE, agus a bhfuil gníomh cur chun feidhme ag Coimisiún an AE, mar aon le gealltanais cheangailteach agus infhorghníomhaithe an rialaitheora nó an phróiseálaí sa tríú tír, a úsáid mar uirlis aistrithe sa todhchaí.
Approved Codes of Conduct: The use of Codes of Conduct as a transfer tool, under specific circumstances, has been introduced by the GDPR in Article 40 (3).  Codes are voluntary and set out specific data protection rules for categories of controllers and processors. They can be a useful and effective accountability tool, providing a detailed description of what is the most appropriate, legal and ethical behaviour within a sector. From a data protection viewpoint, codes can therefore operate as a rulebook for controllers and processors who design and implement GDPR-compliant data processing activities that give operational meaning to the principles of data protection set out in European and national law. Codes of Conduct that relate to personal data processing activities by controllers and processors in more than one EU Member State, and for which the EU Commission has adopted an implementing act, together with binding and enforceable commitments of the controller or processor in the third country, could be used as a transfer tool in the future. The EDPB is planning to issue separate specific guidance, in relation to the use of Codes of Conduct as a transfer tool, at a later date.
  Slándáil Sonraí | Data ...  
D’fhéadfadh go n-áireofaí leo fóin chliste, fótachóipeálaithe digiteacha agus meaisíní facsála, i measc nithe eile. Ní mór aon sonraí a stóráiltear ar na feistí sin a léirscriosadh freisin sula bhfaightear réidh díobh.
It is important to consider the different types of equipment that may hold personal data. Besides obvious examples, such as servers, computers and laptops, there are a number of other devices that may store personal data. These may include smart phones, digital photocopiers, fax machines etc. Any data stored on these devices must also be erased prior to disposal.
  Próiseáil trasteorann a...  
Beidh baint ag údaráis mhaoirseachta, ar a dtugtar údaráis mhaoirseachta lena mbaineann sa chomhthéacs seo (CSAanna), le gníomhaíochtaí próiseála na heagraíochta ina bhfuil aon cheann de na nithe seo a leanas infheidhme:
Your organisation’s engagement in cross-border processing means that supervisory authorities other than your LSA will also be concerned by your processing activities. Supervisory authorities, known in this context as supervisory authorities concerned (CSAs), will be concerned with your organisation’s processing activities where any of the following applies:
  Próiseas Fógra Sháraith...  
Tabhair faoi deara, le do thoil, fiú nuair a chinneann tú nach ann do riosca do dhaoine faoi thrácht tar éis sáraithe de shonraí pearsanta, ní mór duit taifead inmheánach a choimeád faoi na sonraí, faoi na meáin lenar socraíodh nárbh ann d´aon riosca, cé a shocraigh nárbh ann d´aon riosca agus an rátáil riosca a taifeadadh.
Please note even where you determine there is no risk to affected individuals following a personal data breach, you need to keep an internal record of the details, the means for deciding there was no risk, who decided there was no risk and the risk rating that was recorded.
  Próiseas Fógra Sháraith...  
Tabhair faoi deara, le do thoil, fiú nuair a chinneann tú nach ann do riosca do dhaoine faoi thrácht tar éis sáraithe de shonraí pearsanta, ní mór duit taifead inmheánach a choimeád faoi na sonraí, faoi na meáin lenar socraíodh nárbh ann d´aon riosca, cé a shocraigh nárbh ann d´aon riosca agus an rátáil riosca a taifeadadh.
Please note even where you determine there is no risk to affected individuals following a personal data breach, you need to keep an internal record of the details, the means for deciding there was no risk, who decided there was no risk and the risk rating that was recorded.
  Rochtain agus Inchumasa...  
Cóip a sholáthar de na sonraí pearsanta atá á bpróiseáil, gan mhoill mhíchuí agus in aon chás laistigh de mhí amháin.
Provide a copy of the personal data being processed, without undue delay and in any event within one month.
  Treoir ar cháilíochtaí ...  
Ar aon nós, ba cheart go mbeadh leibhéal saineolais chuí ag Oifigeach Cosanta Sonraí ar dhlí agus ar chleachtais cosanta sonraí chun go mbeadh sé/sí in ann a ról ríthábhachtach a chomhlíonadh.
In any case, a Data Protection Officer should have an appropriate level of expertise in data protection law and practices to enable them to carry out their critical role.
  Ag déanamh Nochtadh Cos...  
má chreideann an duine go ciallmhar gur fíor ar an mórgóir iad an fhaisnéis a nochtaítear agus aon líomhaintí atá inti.
the person making the disclosure reasonably believes that that the information disclosed, and any allegation contained in it, are substantially true.
  Gairmeacha | Data Prote...  
​​Níl aon comórtais earcaíochta ar bun faoi láthair. Seiceáil an leathanach seo go rialta le haghaidh nuashonruithe.
There are no recruitment competitions underway at present. Please check this page regularly for updates.
  Prionsabail um Chosaint...  
4. Coimeád iad cruinn agus nuashonraithe agus scrios nó réitigh aon sonraí míchruinne gan mhoill;
Keep it accurate and up-to-date and erase or rectify any inaccurate data without delay;
  Slándáil Sonraí | Data ...  
Ba cheart pasfhocail a bheith measartha furasta le cuimhneamh don úsáideoir agus a bheith an-doiligh le tuar d’aon duine eile. D’fhéadfadh na nithe seo a leanas bheith i gceist le samplaí:
Passwords should be reasonably easy for the user to remember but very difficult for anyone else to guess. Examples might include:
  An ceart chun rochtain ...  
I gcás nach mbailítear sonraí pearsanta ón ábhar sonraí, aon fhaisnéis atá ar fáil maidir lena bhfoinse;
6. The right to raise a concern with a supervisory authority (in Ireland this is the Data Protection Commission)
  Slándáil Sonraí | Data ...  
Gnéithe tábhachtacha den riosca sin a bhainistiú iad bearta slándála teicniúla, measúnuithe slándála, comhaontuithe conarthacha atá ar aon dul le ceanglais an Rialacháin Ghinearálta maidir le Cosaint Sonraí agus le ceanglais an Achta um Chosaint Sonraí, 2018, agus caighdeáin chomhaontaithe um bainistíocht sócmhainní comhroinnte.
Where a staff member / contractor is allowed to access the network from a remote location (e.g. from home or from an off-site visit) such access creates a potential weakness in the system, not least when accessed from a wireless network. For this reason the need for such access should be properly assessed and security measures reassessed before remote access is granted. If feasible, the access should be limited to specific IP addresses. Security should be the first consideration in granting access to partner organisations. Technical security measures, security assessments, contractual agreements in line with the requirements of the GDPR and the Data Protection Act 2018, and agreed standards of management of shared assets are all important aspects in managing this risk. It is the responsibility of the data controller to ensure that, regardless of the means by which a user remotely accesses their system, the security of the system cannot be compromised.
  Cé comh fáda a thógfaid...  
In aon chás, laistigh de 1 mhí ón dáta a fhaightear an t-iarratas
In any event, within 1 month of receipt of the request.
  Cosaint sonraí de réir ...  
Ciallaíonn Cosaint Sonraí de réir réamhshocraithe go gcaithfidh na suíomhanna seirbhíse úsáideora (m.sh. ní bheidh aon rogha uathoibríoch ar leathanaigh cuntais an chustaiméara) cosaint sonraí go huathoibríoch, agus go gcaithfí ach sonraí atá riachtanach do gach cuspóir sonrach den phróiseáil a bhailiú.
Data Protection by default means that the user service settings (e.g. no automatic opt-ins on customer account pages) must be automatically data protection friendly, and that only data which is necessary for each specific purpose of the processing should be gathered at all.
Arrow 1 2 3 4 5 6 7 8 9 Arrow