Difference between revisions of "apply information security policies (Q1546)"

From CompetenceBase

Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)

(‎Created claim: place in process (P28): Independent (Q45), #quickstatements; #temporary_batch_1724307563225)
(‎Created claim: EQF level (P17): No level (Q419), #quickstatements; #temporary_batch_1724307824702)
Property / EQF level
 +
Property / EQF level: No level / rank
 +
Normal rank

Revision as of 06:27, 22 August 2024

Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)
Language Label Description Also known as
English
apply information security policies
Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)

    Statements

    0 references
    0 references
    1,360
    0 references
    apply information security policies (English)
    Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (English)
    1.2.0
    0 references
    0 references

    ESCO description

    Sectoral layer

    Assessment

    References

     

    Wikidata