gur – -Translation – Keybot Dictionary

Spacer TTN Translation Network TTN TTN Login Deutsch Français Spacer Help
Source Languages Target Languages
Keybot 286 Results  www.inchblue.com
  Ag déanamh Nochtadh Cos...  
má chreideann an duine go ciallmhar gur fíor ar an mórgóir iad an fhaisnéis a nochtaítear agus aon líomhaintí atá inti.
the person making the disclosure reasonably believes that that the information disclosed, and any allegation contained in it, are substantially true.
  Cosaint sonraí de réir ...  
Soláthraíonn an GDPR dhá choincheap ríthábhachtach maidir le pleanáil tionscadail amach anseo Cosaint Sonraí Deartha agus Cosaint Sonraí De réir Réamhshocraithe. Cé gur mholtar dea-chleachtas fada, bíonn an dá phrionsabal sin cumhdaithe sa dlí faoin GDPR (Airteagal 25).
The GDPR provides for two crucial concepts for future project planning: Data Protection By Design and Data Protection By Default. While long recommended as good practice, both of these principles are enshrined in law under the GDPR (Article 25).
  Próiseáil trasteorann a...  
Próiseáil sonraí pearsanta a dhéantar san Aontas a dhéantar i gcomhthéacs gníomhaíochtaí bunaíochta aonair de chuid rialaitheora nó próiseálaí san Aontas ach a bhfuil éifeacht shubstainteach ag an bpróiseáil sin ar ábhair sonraí i níos mó ná Ballstát amháin nó gur dóchúil go mbeidh éifeacht shubstainteach aici orthu.
Processing of personal data which takes place in the context of the activities of an organisation’s single establishment but where that processing substantially affects or is likely to substantially affect data subjects in more than one Member State.
  Láimhseáil gearán, Imsc...  
Más rud é, ar bhonn fiosrúcháin (le himscrúdú nó gan imscrúdú), go gcinnfidh an DPC gur tharla sárú, féadfar cumhacht ceartaitheach a chur i bhfeidhm in aghaidh na heagraíochta. Tá cumhachtaí ag na cumhachtaí ceartaitheacha a d'fhéadfadh an DPC a ghearradh in aghaidh eagraíochta cionta:
Where, on the basis of an inquiry (with or without investigation), the DPC decides that an infringement has occurred, a corrective power may be applied against your organisation. The corrective powers that may be levied by the DPC against an offending organisation include powers to:
  Próiseáil trasteorann a...  
Is dócha go mbeidh éifeacht shuntasach ag gníomhaíochtaí próiseála d’eagraíochta nó gur dóchúil go mbeidh éifeacht shubstainteach ag an bpróiseáil ar ábhair sonraí atá ina gcónaí i mBallstát an údaráis mhaoirseachta sin,
Data subjects residing in the Member State of that supervisory authority are substantially affected or are likely to be substantially affected by your organisation’s processing activities,
  Ag déanamh Nochtadh Cos...  
Is reachtaíocht é an tAcht um Nochtadh Cosanta 2014 (Protected Disclosures Act 2014) a achtaíodh chun cosaint a thabhairt do fostaithe atá ag iarraidh imní a chur in iúl maidir le éagóir a d'fhéadfadh a bheith i gceist san áit oibre. Leagann an tAcht roinnt bealaí amach gur féidir nochtuithe a dhéanamh d'fhostóirí agus do chomhlachtaí eachtracha.
The Protected Disclosures Act 2014 is legislation enacted to provide protection to employees who wish to raise a concern relating to potential wrongdoing in the workplace. The Act sets out a number of ways in which disclosures can be made to employers as well as to external bodies.
  Próiseas Fógra Sháraith...  
Uimhir thagartha CCS (más rud é gur soláthraíodh a leithéid)
DPC reference number (if one has been provided)
  Próiseas Fógra Sháraith...  
An bhfuil an sárú ar mian leat fógra a thabhairt faoi don CCS ´nua´ nó an amhlaidh gur ´nuashonrú´ é ar fhógra sáraithe a rinneadh roimhe seo
Whether the breach you wish to notify DPC of is 'new' or an 'update' to a previous breach notification
  Measúnaithe Tionchair a...  
Tá raon bealaí éagsúla ann gur féidir tionscadal nua príobháideacht sonraí duine aonair a chur i mbaol nó a shárú. I measc na gcineálacha riosca tá an baol go mbeidh an tionscadal ina chúis anacra, suaite nó míchaothúileachta nó ina chúis chaillteanais airgeadais nó dochair fhisicigh.
This exercise should be documented using whatever means are most suitable for your organisation and the project concerned. Using visual aids, such as flow charts, to document how information will be used as part of a project can assist in identifying potential data privacy risks. This may also help with internal communication by better allowing the project team and others in your organisation to understand the design of the project.
  Aistriú sonraí pearsant...  
Mar sin féin, níor cheart go ndéanfadh aistriú sonraí pearsanta den sórt sin ón AE do rialtóirí agus do phróiseálaithe atá lonnaithe lasmuigh den AE i dtríú tíortha bonn cosanta na ndaoine aonair lena mbaineann, agus gur tír ar bith atá i dtríú tír lasmuigh den Limistéar Eorpach Eacnamaíoch (an "EEA ").
Flows of personal data to and from the European Union (the “EU”) are necessary for international trade and international co-operation. However, the transfer of such personal data from the EU to controllers and processors located outside the EU in third countries should not undermine the level of protection of the individuals concerned, with a third country being any country outside the European Economic Area (the “EEA”). Therefore, transfers to third countries or international organisations should be done in full compliance with Chapter V of the General Data Protection Regulation, the “GDPR”.
  Próiseas Fógra Sháraith...  
Agus an iarmhairt fhéideartha seo á measúnú agat, ba chóir duit na rudaí seo a chur san áireamh: nádúr an tsáraithe, cúis an tsáraithe, cineál na sonraí a nochtaíodh, fachtóirí maolaithe i bhfeidhm agus más rud é gur nochtaíodh sonraí pearsanta daoine leochaileacha.
In determining how serious you consider the breach to be for affected individuals, you should take into account the impact the breach could potentially have on individuals whose data has been exposed. In assessing this potential impact you should consider the nature of the breach, the cause of the breach, the type of data exposed, mitigating factors in place and whether the personal data of vulnerable individuals has been exposed. The levels of risk are further defined below:
  Slándáil Sonraí | Data ...  
Mar sin féin, ós rud é go n-eascraíonn mórfhadhbanna cosanta sonraí agus príobháideachais as bithmhéadraigh iontu féin (féach an treoir uainn maidir le bithmhéadraigh), níor cheart a n-úsáid a bhreithniú ach amháin i gcás gur léir nach leor modhanna eile fíordheimhniúcháin.
2 This list is not exhaustive. For example, a biometric (e.g. a fingerprint, voice or retina scan) can also be used as a unique identifier. However, as biometrics in themselves raise serious data protection and privacy issues (see our guidance on biometrics), their use should only be considered where other authentication methods are demonstrably insufficient.
  Slándáil Sonraí | Data ...  
Ní mór tacú leis sin trí athbhreithnithe rialta a dhéanamh ar an rochtain iarbhír chun a áirithiú gur riachtanach go dian atá an rochtain údaraithe ar fad ar shonraí pearsanta agus go bhfuil údar léi le haghaidh feidhm a chomhlíonadh.
Consideration must be given to the different requirements of each of these types of user and their access privileges to personal data should fully reflect these requirements. The nature of access allowed to an individual user should be set and reviewed on a regular basis. Individual staff members should only have access to data which they require in order to perform their duties. Specific procedures sometimes referred to as a "movers, leavers and joiners" policy are required in all organisations with access to personal data to increase or restrict previous access where a user role changes, prevent use of shared credentials (multiple individuals using a single username and password) and detect use of default passwords. This must be supported by regular reviews of actual access to ensure that all authorised access to personal data is strictly necessary and justifiable for the performance of a function.
  Slándáil Sonraí | Data ...  
Tá córas cúltaca ina mhodh bunriachtanach le haghaidh athshlánú tar éis sonraí a chailleadh nó a léirscriosadh. Cé gur cheart córas de chineál éigin a bheith i bhfeidhm, beidh minicíocht agus cineál an chúltaca ag brath ar an gcineál eagraíochta agus ar chineál na sonraí atá á bpróiseáil, i measc nithe eile.
A back up system is an essential means of recovering from the loss or destruction of data. While some system should be in place, the frequency and nature of back up will depend, amongst other factors, on the type of organisation and the nature of data being processed. The security standards for back-up data are the same as for live data.
  Slándáil Sonraí | Data ...  
Tá sé mar fhreagracht ar an rialaitheoir sonraí a áirithiú go ndearnadh na sonraí go léir a stóráladh roimhe sin ar na feistí a bhaint sula bhfaightear réidh díobh. Ní leor tiomántáin chrua na bhfeistí a fhormáidiú amháin mar gur féidir na sonraí a aisghabháil fós.
When disposing of obsolete or redundant equipment many data controllers offer the equipment for sale to staff or donate it to charities. It is the responsibility of the data controller to ensure that all data previously stored on the devices has been removed prior to disposal. It is not sufficient to merely format the hard drives of the devices, as data can still be retrieved. Software is available that will overwrite the contents of the hard drive with a series of 1's and 0's to ensure that previous data can not be retrieved. Dependant on the nature of the data stored, it is recommended that hard drives should be overwritten between three and five times.
  Aistriú sonraí pearsant...  
Is é éifeacht an chinnidh sin ná gur féidir le sonraí pearsanta sreabhadh ón LEE chuig an tríú tír sin gan aon chosaint breise a bheith riachtanach. I bhfocail eile, tá an t-aistriú mar an gcéanna dá ndéanfaí é laistigh den AE.
The effect of such a decision is that personal data can flow from the EEA to that third country without any further safeguard being necessary. In other words, the transfer is the same as if was carried out within the EU.
  Slándáil Sonraí | Data ...  
Is féidir le deimhniú a bheith ina mhodh úsáideach chun a thaispeáint go bhfuiltear ag comhlíonadh oibleagáidí slándála, i gcás go dtugtar le fios leis an deimhniú gur cuireadh rialuithe slándála sonraí faoi iniúchadh nó faoi athbhreithniú in aghaidh caighdeán aitheanta ag eagraíocht tríú páirtí a bhfuil dea-chlú uirthi.
Certification can be a useful means of demonstrating compliance with security obligations, where certification indicates that data security controls have been subject to audit or review against a recognised standard by a reputable third party organisation. In the context of Cloud computing, customers should look to see whether cloud services providers can provide a copy of this third party audit certificate. Where Cloud Service Providers offer Model Clauses, a relevant third party audit report may satisfy in lieu of an individual right to audit. Individual audits of data hosted in a multi-party, virtualised server environments may be impractical technically and in fact serve to increase risks to those physical and logical network security controls in place.
  Measúnaithe Tionchair a...  
Measann an Mheitheal Oibre gur dócha go mbeidh riosca níos airde ann do chearta agus do shaoirsí ábhar sonraí agus dá bhrí sin go mbeidh gá ann le DPIA de réir mar a gcomhlíonann próiseáil níos mó critéar.
Innovative use or applying technological or organisational solutions, like combining use of finger print and face recognition for improved physical access control, etc. The GDPR makes it clear (Article 35(1) and recitals 89 and 91) that use of a new technology can trigger the need to carry out a DPIA. This is because the use of a new technology can involve novel forms of data collection and usage, possibly with a high risk to individuals’ rights and freedoms. Indeed, the personal and social consequences of the deployment of a new technology may be unknown. A DPIA will help the data controller to understand and to treat such risks. For example, certain “Internet of Things” applications could have a significant impact on individuals’ daily lives and privacy; and therefore require a DPIA.
  Slándáil Sonraí | Data ...  
Tá balla dóiteáin ina bhunriachtanas i gcás go bhfuil aon nascacht sheachtrach ann, bíodh sí chuig líonraí eile nó chuig an Idirlíon. Tá sé tábhachtach go gcumraítear ballaí dóiteáin i gceart mar gur uirlis ríthábhachtach iad le haghaidh iarrachtaí rochtain neamhúdaraithe a fháil a chomhrac.
A firewall is essential where there is any external connectivity, either to other networks or to the internet. It is important that firewalls are properly configured, as they are a key weapon in combating unauthorised access attempts. The importance of firewalls has increased as organisations and individuals increasingly avail of "always-on" internet connections, exposing themselves to a greater possibility of attack.
  Láimhseáil gearán, Imsc...  
Go ginearálta, ní mheasfaidh an DPC tús le fiosrúchán nuair a léiríonn an t-ábhar a d'eascair go bhfuil an sárú sonraí a líomhnaítear ina nádúr thar a bheith tromchúiseach agus / nó a léiríonn gur theip ar an gcóras laistigh den eagraíocht atá i gceist.
An inquiry (with or without investigation) may also result in the DPC issuing a formal decision in relation to the matter. Generally speaking, the DPC will only consider commencing an inquiry where the matter raised indicates that the alleged data breach is of an extremely serious nature and/or indicative of a systemic failing within the organisation in question.
  Cás Staidéar | Data Pro...  
Níor glacadh bearta ar bith chun a chinntiú gur chomhlíontach é an próiseálaí sonraí leis na bearta slándála agus eagrúcháin teicniúla;
No steps were taken to ensure that the data processor was compliant with technical security and organisational measures.
  Cás Staidéar | Data Pro...  
Glactar bearta réasúnta chun a chinntiú gur feasach faoina n-oibleagáidí d’fhostaithe an Rialtóra Sonraí agus do dhaoine ar bith eile, mar shampla, fostaithe Próiseálaí Sonraí, a bhaineann leis an bpróiseáil;
Reasonable steps are taken to ensure that employees of the Data Controller and any other persons, for example, Data Processor employees, associated with the processing are aware of their obligations;
  Slándáil Sonraí | Data ...  
Is féidir le deimhniú a bheith ina mhodh úsáideach chun a thaispeáint go bhfuiltear ag comhlíonadh oibleagáidí slándála, i gcás go dtugtar le fios leis an deimhniú gur cuireadh rialuithe slándála sonraí faoi iniúchadh nó faoi athbhreithniú in aghaidh caighdeán aitheanta ag eagraíocht tríú páirtí a bhfuil dea-chlú uirthi.
Certification can be a useful means of demonstrating compliance with security obligations, where certification indicates that data security controls have been subject to audit or review against a recognised standard by a reputable third party organisation. In the context of Cloud computing, customers should look to see whether cloud services providers can provide a copy of this third party audit certificate. Where Cloud Service Providers offer Model Clauses, a relevant third party audit report may satisfy in lieu of an individual right to audit. Individual audits of data hosted in a multi-party, virtualised server environments may be impractical technically and in fact serve to increase risks to those physical and logical network security controls in place.
  Slándáil Sonraí | Data ...  
Conas a bheadh a fhios agat gur fhulaing d’eagraíocht sárú sonraí? An dtuigeann foireann na heagraíochta (ar gach leibhéal) na himpleachtaí a ghabhann le sonraí pearsanta a chailleadh?
How would you know that your organisation had suffered a data breach? Does the organisation's staff (at all levels) understand the implications of losing personal data?
  Ag déanamh Nochtadh Cos...  
Is duine forordaithe é an Coimisiún Cosanta Sonraí faoi Alt 7 san Acht um Nochtadh Cosanta agus faoi Ionstraim Reachtúil 339 do 2014. Ciallaíonn seo gur féidir le fostaithe nochtuithe cosanta a dhéanamh don Choimisiún Cosanta Sonraí maidir le comhlíonadh leis na hAchtanna um Chosaint Sonraí.
The Data Protection Commission is a prescribed person under section 7 of the Protected Disclosures Act and Statutory Instrument 339 of 2014. This means that employees may make protected disclosures to the Data Protection Commission regarding compliance with the Data Protection Acts.
  Slándáil Sonraí | Data ...  
Ní hé amháin gur cheart díriú a leagan i bpróisis faireacháin ar líonraí, ar chórais oibriúcháin, ar chórais bhraite ionróirí agus ar bhallaí dóiteáin, ach ba cheart seirbhísí cianrochtana, feidhmchláir Ghréasáin agus bunachair shonraí a chur ar áireamh iontu freisin.
Access control systems and security policies are undermined if the system cannot identify abuses. Consequently, a system should be able to identify the user name that accessed a file and the time of the access. A log of alterations made, along with author / editor, should also be created. Logs and audit trails can help in the effective administration of the security system and can deter staff members tempted to abuse the system. Staff should be informed that logging is in place and that user logs are regularly reviewed. Monitoring processes should focus not only on networks, operating systems, intruder detection systems and firewalls, but should include remote access services, web applications and databases.
  Slándáil Sonraí | Data ...  
Is féidir le deimhniú a bheith ina mhodh úsáideach chun a thaispeáint go bhfuiltear ag comhlíonadh oibleagáidí slándála, i gcás go dtugtar le fios leis an deimhniú gur cuireadh rialuithe slándála sonraí faoi iniúchadh nó faoi athbhreithniú in aghaidh caighdeán aitheanta ag eagraíocht tríú páirtí a bhfuil dea-chlú uirthi.
Certification can be a useful means of demonstrating compliance with security obligations, where certification indicates that data security controls have been subject to audit or review against a recognised standard by a reputable third party organisation. In the context of Cloud computing, customers should look to see whether cloud services providers can provide a copy of this third party audit certificate. Where Cloud Service Providers offer Model Clauses, a relevant third party audit report may satisfy in lieu of an individual right to audit. Individual audits of data hosted in a multi-party, virtualised server environments may be impractical technically and in fact serve to increase risks to those physical and logical network security controls in place.
  Slándáil Sonraí | Data ...  
Ní hé amháin go mbaineann sé sin le ríomhairí atá i limistéir phoiblí ach baineann sé le gach ríomhaire freisin. Ní fiú córas rialaithe rochtana a bheith i bhfeidhm más rud é gur féidir le ball foirne ar bith rochtain a fháil ar ríomhairí nach bhfuil aon duine ina mbun.
Most systems allow for screensavers to activate after a period of inactivity on a computer, requiring a password to re-establish access. This automatic lock activation is useful as the alternative manual locking of a workstation requires positive action by the user every time he/she leaves the computer unattended. Regardless of which method an organisation employs, computers should be locked when unattended. This applies not just to computers in public areas, but to all computers. It is pointless having an access control system in place if unattended computers may be accessed by any staff member.
  Slándáil Sonraí | Data ...  
Is leochaileach go háirithe i leith gadaíochta agus caillteanas de thimpiste atá ríomhairí glúine, méaróga cuimhne, fóin chliste agus cineálacha eile feiste iniompartha. I gcás go measann rialaitheoir sonraí gur gá sonraí pearsanta a stóráil ar fheiste iniompartha, ba cheart an fheiste sin a bheith criptithe.
Laptops, USB keys, smart phones and other forms of portable device are especially vulnerable to theft and accidental loss. Where a data controller considers it essential to store personal data on a portable device, these devices should be encrypted. Whole disk encryption should be used to mitigate against storage of files outside of an encrypted segment of the disk. In the case of smart phones, a strong password should be required at start up and also after several minutes of inactivity. When such a device is lost steps should be taken immediately to ensure that the remote memory wipe facility is activated. Staff allocated such devices should be familiar with the relevant procedures.
  Ag déanamh Nochtadh Cos...  
Forálann Alt 7 don Acht um Nochtadh Cosanta gur féidir nochtuithe cosanta a dhéanamh do rialálaithe eachtracha áirithe, nó "daoine forordaithe" mar a thagraítear san Acht. Tá liosta de na daoine forordaithe seo in Ionstraim Reachtúil 339/2014 a leasaíodh ag an Ionstraim Reachtúil 448/2015.
Section 7 of the Protected Disclosures Act provides that protected disclosures may be made to certain external regulators, referred to as “prescribed persons” in the Act. These prescribed persons are listed in Statutory Instrument 339/2014 as amended by Statutory Instrument 448/2015.
1 2 3 4 5 6 7 8 9 10 Arrow