Difference between revisions of "apply information security policies (Q1546)"

From CompetenceBase

Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)

(‎Created claim: ESCO title (P11): apply information security policies, #quickstatements; #temporary_batch_1724246863391)
(‎Added qualifier: ESCO description (P12): Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles., #quickstatements; #temporary_batch_1724246863391)
Property / ESCO title: apply information security policies (English) / qualifier
 +
ESCO description: Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (English)

Revision as of 13:32, 21 August 2024

Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)
Language Label Description Also known as
English
apply information security policies
Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)

    Statements

    0 references
    0 references
    1,360
    0 references
    apply information security policies (English)
    Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (English)
    0 references

    ESCO description

    Sectoral layer

    Assessment

    References

     

    Wikidata