Difference between revisions of "apply information security policies (Q1546)"
From CompetenceBase
(Added qualifier: ESCO version (P15): 1.2.0, #quickstatements; #temporary_batch_1724246863391) | (Created claim: place in process (P28): Independent (Q45), #quickstatements; #temporary_batch_1724307563225) | ||
Property / place in process | |||
+ | |||
Property / place in process: Independent / rank | |||
+ | Normal rank |
Revision as of 06:23, 22 August 2024
Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)
Language | Label | Description | Also known as |
---|---|---|---|
English | apply information security policies | Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO) |
Statements
1,360
0 references
apply information security policies (English)
Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (English)
1.2.0
0 references