Difference between revisions of "apply information security policies (Q1546)"
From CompetenceBase
(Created claim: ESCO Skill reusability level (P83): sector-specific (Q1628), #quickstatements; #temporary_batch_1725526611689) | (Changed claim: competence unique identifier (P47): 20) | ||
(2 intermediate revisions by one other user not shown) | |||
aliases / nl / 0 | aliases / nl / 0 | ||
+ | zorgdragen voor naleving van regels met betrekking tot gegevensbeveiliging | ||
aliases / nl / 1 | aliases / nl / 1 | ||
+ | gegevens beveiligen | ||
aliases / nl / 2 | aliases / nl / 2 | ||
+ | gegevensbeveiliging toepassen | ||
aliases / nl / 3 | aliases / nl / 3 | ||
+ | beleid methoden en regels toepassen voor gegevens- en informatiebeveiliging om te voldoen aan vertrouwelijkheids-integriteits- en beschikbaarheidsprincipes | ||
aliases / nl / 4 | aliases / nl / 4 | ||
+ | regels met betrekking tot gegevensbeveiliging naleven | ||
aliases / nl / 5 | aliases / nl / 5 | ||
+ | wetgeving met betrekking tot gegevensbeveiliging | ||
Property / competence unique identifier | Property / competence unique identifier | ||
- | + | 20 | |
Property / ESCO Status | |||
+ | |||
Property / ESCO Status: released / rank | |||
+ | Normal rank |
Latest revision as of 15:04, 20 September 2024
Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)
- apply data protection
- comply with data protection regulations
- data protection regulations
- data security
- ensure CIA
- ensure confidentiality principles
- information security policy
- protect data
- protect information
- secure data
Language | Label | Description | Also known as |
---|---|---|---|
English | apply information security policies | Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO) |
|
Statements
1,360
0 references
apply information security policies (English)
Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (English)
1.2.0
0 references
20
0 references