Difference between revisions of "apply information security policies (Q1546)"

From CompetenceBase

Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)

(‎Added qualifier: ESCO version (P15): 1.2.0, #quickstatements; #temporary_batch_1724246863391)
(‎Created claim: place in process (P28): Independent (Q45), #quickstatements; #temporary_batch_1724307563225)
Property / place in process
 +
Property / place in process: Independent / rank
 +
Normal rank

Revision as of 06:23, 22 August 2024

Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)
Language Label Description Also known as
English
apply information security policies
Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)

    Statements

    0 references
    0 references
    1,360
    0 references
    apply information security policies (English)
    Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (English)
    1.2.0
    0 references

    ESCO description

    Sectoral layer

    Assessment

    References

     

    Wikidata