Difference between revisions of "apply information security policies (Q1546)"

From CompetenceBase

Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)

(‎Changed claim: competence unique identifier (P47): 20)
(‎Created claim: ESCO title (P11): Informationssicherheitsstrategien anwenden, #quickstatements; #temporary_batch_1733403462879)
Property / ESCO title
 +
Informationssicherheitsstrategien anwenden (German)
Property / ESCO title: Informationssicherheitsstrategien anwenden (German) / rank
 +
Normal rank

Revision as of 13:13, 5 December 2024

Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)
  • apply data protection
  • comply with data protection regulations
  • data protection regulations
  • data security
  • ensure CIA
  • ensure confidentiality principles
  • information security policy
  • protect data
  • protect information
  • secure data
Language Label Description Also known as
English
apply information security policies
Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (ESCO)
  • apply data protection
  • comply with data protection regulations
  • data protection regulations
  • data security
  • ensure CIA
  • ensure confidentiality principles
  • information security policy
  • protect data
  • protect information
  • secure data

Statements

0 references
0 references
1,360
0 references
apply information security policies (English)
Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles. (English)
1.2.0
0 references
Informationssicherheitsstrategien anwenden (German)
0 references
0 references
0 references

ESCO description

Sectoral layer

Assessment

References

 

Wikidata