Difference between revisions of "apply information security policies (Q1546)"

From CompetenceBase

Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)

(‎Set [en] alias: secure data)
(‎Set [en] aliases: apply data protection, comply with data protection regulations, data protection regulations, data security, ensure CIA, ensure confidentiality principles, information security policy, protect data, protect information, secure data)
aliases / en / 0aliases / en / 0
 +
apply data protection
aliases / en / 1aliases / en / 1
 +
comply with data protection regulations
aliases / en / 2aliases / en / 2
 +
data protection regulations
aliases / en / 3aliases / en / 3
 +
data security
aliases / en / 4aliases / en / 4
 +
ensure CIA
aliases / en / 5aliases / en / 5
 +
ensure confidentiality principles
aliases / en / 6aliases / en / 6
 +
information security policy
aliases / en / 7aliases / en / 7
 +
protect data
aliases / en / 8aliases / en / 8
 +
protect information

Revision as of 14:07, 4 September 2024

Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)
  • apply data protection
  • comply with data protection regulations
  • data protection regulations
  • data security
  • ensure CIA
  • ensure confidentiality principles
  • information security policy
  • protect data
  • protect information
  • secure data
Language Label Description Also known as
English
apply information security policies
Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)
  • apply data protection
  • comply with data protection regulations
  • data protection regulations
  • data security
  • ensure CIA
  • ensure confidentiality principles
  • information security policy
  • protect data
  • protect information
  • secure data

Statements

0 references
0 references
1,360
0 references
apply information security policies (English)
Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (English)
1.2.0
0 references
0 references

ESCO description

Sectoral layer

Assessment

References

 

Wikidata