| 1. | For more information about security procedures , see 有关安全步骤的详细信息,请参阅 |
| 2. | Vehicles entering the secure zone have to display authorised permits and follow the security procedures 进入保安区的车辆需要持有通行证及通过保安检查。 |
| 3. | Also , the application may not be able to use certain assets because of local security procedures 同时,出于对本地安全性的要求,这样的应用程序可能无法使用某些资源。 |
| 4. | The internet is not a secure medium . however we have put in place various security procedures as set out in this policy 考虑到因特网这一媒体的安全性,本公司采取了如下资料安全保护措施。 |
| 5. | In the light of the current situation in london , chelsea has been continually reviewing its security procedures for the first home match of the season against arsenal 基本伦敦当前局势,切尔西俱乐部已经频繁检查安全隐患,以备切尔西首个主场对阵阿森纳。 |
| 6. | All employees should be trained in security procedures , and all user activity should be monitored so that attacks by trusted users do not go undetected 所有员工都应进行安全规程方面的培训,并且应监视所有用户活动,使受信任用户发起的攻击不会无法检测到。 |
| 7. | To address this , organizations must put effective security procedure in place and make sure they remain effective by periodically carrying out penetration testing 为了解决这一问题,公司必须制定出有效的安全程序并且不时地通过检测来确保这些程序的有效性。 |
| 8. | Please have a knowledgeable hr representative from the factory , and operations representatives from 2 - 3 service provider partners ( trucking ) available for a brief q & a session with the auditor regarding security procedures and hiring practices 在审核中,贵厂需安排一位具备相关经验的人事代表,并且从现有2 - 3个物流服务商中安排物流服务人员(如司机) ,与审核员一起共同参加有关安全程序和雇佣政策的问答环节。 |
| 9. | The finally , according to the characters of trade secret , the paper suggest it is necessary to make a further completion and addition on competency , burden of proof , civil relief and setting security procedure in criminal procedure on the case of infringement of trade secret 最后,根据商业秘密的特性,提出了有必要对侵犯商业秘密案件刑事诉讼中管辖、举证责任、民事救济与保密程序设置等方面作进一步的完善和补充。 |
| 10. | To remind ais that they should have adequate data security procedures , such as computer log - on and application - specific access passwords and data encryption technology , to protect against theft and unauthorised access of computer equipment or information in open - plan areas 中提醒认可机构,要有足够的资料保安程序,例如电脑的登入及接达特定应用程式的密码,以及数据加密技术,以防范在开放式范畴内的电脑设备或资料被盗取及被未经授权取用。 |