Difference between revisions of "apply information security policies (Q1546)"

From CompetenceBase

Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)

(‎Created claim: ESCO Status (P84): released (Q1630), #quickstatements; #temporary_batch_1725526959284)
(‎Changed claim: competence unique identifier (P47): 20)
 
(One intermediate revision by one other user not shown)
aliases / nl / 0aliases / nl / 0
 +
zorgdragen voor naleving van regels met betrekking tot gegevensbeveiliging
aliases / nl / 1aliases / nl / 1
 +
gegevens beveiligen
aliases / nl / 2aliases / nl / 2
 +
gegevensbeveiliging toepassen
aliases / nl / 3aliases / nl / 3
 +
beleid methoden en regels toepassen voor gegevens- en informatiebeveiliging om te voldoen aan vertrouwelijkheids-integriteits- en beschikbaarheidsprincipes
aliases / nl / 4aliases / nl / 4
 +
regels met betrekking tot gegevensbeveiliging naleven
aliases / nl / 5aliases / nl / 5
 +
wetgeving met betrekking tot gegevensbeveiliging
Property / competence unique identifierProperty / competence unique identifier
-
XX
+
20

Latest revision as of 15:04, 20 September 2024

Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)
  • apply data protection
  • comply with data protection regulations
  • data protection regulations
  • data security
  • ensure CIA
  • ensure confidentiality principles
  • information security policy
  • protect data
  • protect information
  • secure data
Language Label Description Also known as
English
apply information security policies
Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)
  • apply data protection
  • comply with data protection regulations
  • data protection regulations
  • data security
  • ensure CIA
  • ensure confidentiality principles
  • information security policy
  • protect data
  • protect information
  • secure data

Statements

0 references
0 references
1,360
0 references
apply information security policies (English)
Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (English)
1.2.0
0 references
0 references
0 references

ESCO description

Sectoral layer

Assessment

References

 

Wikidata