Difference between revisions of "apply information security policies (Q1546)"

From CompetenceBase

Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)

(‎Added qualifier: ESCO description (P12): Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles., #quickstatements; #temporary_batch_1724246863391)
(‎Added qualifier: ESCO version (P15): 1.2.0, #quickstatements; #temporary_batch_1724246863391)
Property / ESCO title: apply information security policies (English) / qualifier
 +

Revision as of 13:32, 21 August 2024

Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)
Language Label Description Also known as
English
apply information security policies
Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)

    Statements

    0 references
    0 references
    1,360
    0 references
    apply information security policies (English)
    Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (English)
    1.2.0
    0 references

    ESCO description

    Sectoral layer

    Assessment

    References

     

    Wikidata