ritkabetegsegakademia.hu | In case case the the data data breach breach has has high high risk risk for for the the rights rights and and freedom freedom of of the the data’s subject, subject, Diamond Diamond Congress Congress Ltd. Ltd. informs informs the the data’s subject subject about about the the data data breach… | datum breach, breach case, breach diamond, breach high, breach reasonable | datum, congress, case, subject, participant | 4 |
falcongt.hu | High number of the external threats will become a breach through these megatrends resulting in possible solid loss in IP or actual dollars threatening even for the largest global enterprises. Our objective is to quantify thereal digital risk f or our customers and to demonstrate the identified IT… | security breach, breach extraordinary, threat breach, breach megatrend, assessment breach | system, consulting, security, risk, datum | 3 |
adatvedelmi-jog.hu | …rule for data processors. Companies must keep an internal, written record about their data processing activities. In specified cases EU representatives or data protection officers must be assigned to companies, furthermore they are obliged to notify the authorities in case of data breaches. | datum breach, breach processor, authority breach, breach hour | datum, protection, law, subject, case | 3 |
fklaw.hu | 9. Incorporate robust data security systems to minimize the likelihood of data breaches and have proper procedures in place to follow in case of a breach. | datum breach, breach proper | law, datum, firm, legal, client | 2 |
cyber-risk.hu | Data protection liability covers data loss and breach of business and personal data, where either a mistake of a co-worker or outer hacking can be the reason of the damage. A proper Cyber Risk Insurance can manage all these issues. | loss breach, breach business | risk, insurance, datum, protection, loss | 2 |
budatrioapartments.hu | A serious breach of contract on the part of the Customer is considered to be a serious breach of contract if the Customer significantly violates the provisions of the GTC, Terms of Use or Privacy Policy. In such a case, the Service Provider may refuse to make a reservation. | customer breach, breach contract, provider breach, breach obligation | customer, provider, term, use, order | 2 |
vps-hosting.hu | In general, any activity in breach of the Criminal Code of Hungary or any other illegal activity | material breach, breach copyright, activity breach, breach criminal | server, plan, memory, guarantee, support | 2 |
munkavedinfo.hu | …team of security professionals to keep your data safe. This is particularly important if you’re planning to use the portal for the purpose of remote get togethers. Board-level files are some of the most sensitive within an organization, and it’s crucial to protect them by breaches and cyberattacks. | crucial breach, breach cyberattacks | datum, paper, room, document, custom | 1 |
drdoczy.hu | damage claims, contract breach claims, insurance claims (indemnity insurance, comprehensive insurance and healthcare insurance claims), medical malpractice cases, lack of conformity (warranty and guarantee cases), possesion aquisition, inheritance proceeding, foreign currency loan claims | contract breach, breach claim | legal, advice, law, contract, litigation | 1 |
pepperpr.hu | …the Budapest XVIII. - XIX. district Court handed out a 10 months jail sentence and a 2 years ban on public matters to a recidivist private individual. According to the judgment, the culprit carried out a 29 case, businesslike breach of the copyright law. The culprit cannot be released on probation. | businesslike breach, breach copyright | pepper, software, technology, hungarian, job | 1 |
drhodosi.hu | …disputes. Most of us, unfortunately, do not have enough knowledge of court proceedings. However, in such a situation,a seemingly insignificant breach of the rules can have serious consequences. In a part of the cases, therefore, the application of the legal representative was made mandatory by… | insignificant breach, breach rule | case, legal, contract, solution, client | 1 |
itinsight.hu | …the rest. We can design static websites or build complex web applications from scratch. We will make sure you’re visible on the internet and perform Search Engine Optimization (SEO) for your site. We design web applications with security in mind to ensure you won’t be the target of the next breach. | | consulting, ethical, hack, software, website | 1 |
theorangefiles.hu | On September 12, 2018, Members of the European Parliament (MEPs) of the European Union adopted a resolution asking the Council of the European Union to determine if the government of Hungary has initiated measures and engaged in activity that present “a clear risk of a serious breach” of the… | risk breach, breach fundamental | national, hungarian, file, orange, european | 1 |
testvanguard.hu | By continuously analyzing vast amounts of data and monitoring system behavior in real-time, identify suspicious activities and potential security breaches, allowing for prompt mitigation actions. | security breach, breach prompt | testing, software, comprehensive, case, system | 1 |
dalszovegforditas.hu | I wouldn't wouldn't want want to to breach breach it it but but mistakes mistakes happen happen always always (Mistakes) | | launch, like, happiness, life, heart | 1 |
dentys.hu | …with the Patient as well as following the termination of the Treatment Plan, the Provider concludes a new Plan only when the Patient doesn’t have any debt arising from previous services towards the Provider or if the previous Treatment Plan hasn’t been terminated owing to a breach of contract. | plan breach, breach contract | treatment, provider, dental, patient, plan | 1 |
barnoczki.hu | a data protection officer, for example, I am aware of how data protection relates to civil damages law or even employment law, or as a public procurement consultant, how contracts can be amended in public procurement cases or what the criminal law consequences of certain breaches of contract may be. | certain breach, breach contract | law, contract, case, rule, important | 1 |
tourdematra.hu | Our Club reserves the right to monitor all comments and to remove any comments which can be considered inappropriate, offensive or causes breach of these Terms and Conditions. | offensive breach, breach term | tour, race, entry, road, cycling | 1 |
makramate.hu | SCP: Unity was an FPS survival horror game set in the SCP universe. It’s original purpose was to remake the original SCP: Containment Breach game using modern tools. | containment breach, breach game | game, engine, portfolio, technology, system | 1 |
matrabikersc.hu | Our Club reserves the right to monitor all comments and to remove any comments which can be considered inappropriate, offensive or causes breach of these Terms and Conditions. | offensive breach, breach term | cycling, bike, website, member, road | 1 |
itcompany.hu | Cyberattacks are becoming increasingly sophisticated, and the consequences of a breach can be devastating. | consequence breach, breach devastating | support, cybersecurity, solution, cooperation, provider | 1 |
competition.hu | According to its press release issued on 28 September 2021, the Hungarian Competition Authority ("HCA"), which has adopted an increasingly strict approach recently, imposed another large fine of nearly € 300 000 for a breach of consumer protection law. This time, the... | nearly breach, breach consumer | competition, law, consumer, hungarian, authority | 1 |
golyo.hu | Microsoft Virtual Academy Cloud Dropping the Hammer on Malware with Windows 10 Device Guard | server breach, breach resistance | server, academy, virtual, security, associate | 0 |
interrescue.hu | …avalanches, etc) and domestic missions on the basis of experience gained has been introduced unified training and examination system. Member organizations working experience of experts adopted a range of specialized technical rescue mission when calculating their technical systems and their… | levee breach, breach hurricane | rescue, international, association, special, system | 0 |
kocsisszabougyved.hu | Kocsis and Szabo Law Office started its legal activities in 2004 in Budapest and has given its responsible legal advise to its clients and partners since that time. Our approach is practical and client-oriented this is why we pay a lot of attention to you and your claims. Our Law Office is… | party breach, breach contractual | law, legal, office, representation, lawyer | 0 |
pekan.hu | Privacy of children… Use and processing of collected information… Managing information… Disclosure of… | datum breach | security, datum, child, table | 0 |
dpc.hu | DPC Consulting designed and successfully delivered the first installment of GE Healthcare Java Academy, an 8-week learning and coding bootcamp aimed at junior Java developers. The program combines traditional classroom training, hands-on exercises and team projects, uses high quality bespoke… | breach policy | consulting, training, fusion, system, software | 0 |
drbennandras.hu | …of block of freehold flats. Beside the participants of the economy the Office pays special attention to the personal legal counseling of private individuals and to the occasional representations in the fields of lawsuits, real estate buying-selling, family law, execution processes and all… | | law, representation, office, legal, contract | 0 |
kovacs-hawa.hu | Founder of the Kovács-Hawa Law Office. Dr Diana Kovács-Hawa has over 10 years of experience acting in matters of family law, property law and corporate law. She speaks Hungarian and English. | | legal, agreement, representation, lawyer, law | 0 |
mediaaccess.hu | Conspiracy to Commit Fraud with the Kiraly Family, TV2, Friderikusz, Presser Gábor, Mester Tamás, Fenyő Miklós, Eszenyi Enikő, tabloid magazines, other Hungarian TV and Radio outlets, and you, their supporters – Organized Crime Exposed – In Memory of Tóth Lüszi (English) | | documentary, history, america, article, american | 0 |
catalogdb.hu | …agree that The Catalog - NoSQL Database System shall not be responsible or liable, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods or services available on or through any such web sites or services. | | catalog, system, database, small, requirement | 0 |