akuna.hu | Upon receipt of the goods from the transport company, the buyer is required to check the integrity of the goods packaging and the condition of the shipment and, in the event of any defects, immediately notify the transport company. In the event of violation of the packaging indicating unauthorized… | order unauthorized, unauthorized unpaid, packaging unauthorized, unauthorized entry, administrator unauthorized | buyer, seller, agreement, purchase, case | 3 |
ritkabetegsegakademia.hu | We speak speak about about personal personal data data breach breach in in case case your your data data is is accessed accessed by by unauthorized unauthorized third third person, person, or or there there is is a a danger danger of of accession. | unauthorized person, datum unauthorized, access unauthorized | datum, congress, case, subject, participant | 3 |
ap-x.hu | (2) The Company shall protect the data by appropriate measures against unauthorized access, alteration, transmission, disclosure, deletion or destruction, and accidental destruction. | measure unauthorized, unauthorized access, client unauthorized, unauthorized intrusion | datum, subject, process, personal, shall | 3 |
outernet.hu | We have obtained ISO27001 certification. Our goal is to prevent any data leakage, unauthorized modification and loss of information on the sensitive part of the information we handle. In full possession of the internationally acclaimed certificate, we can confidently state that the continuous… | leakage unauthorized, unauthorized modification | system, colleague, price, administrator, customer | 2 |
ravera.hu | We only use your personal information to provide you the RAVERA Ltd. services or to communicate with you about the Website or the services. We employ industry standard techniques to protect against unauthorized access of data about you that we store, including personal information. We do not share… | technique unauthorized, unauthorized access, misuse unauthorized | industrial, engineering, mechanical, co., industry | 2 |
eutdij.hu | In every cases all vehicle owners has to purchase route ticket before vehicles begin road usage. On the e-road toll obligatory roads there is an extensive network of fixed and mobile control system functioning, thereby filtering out unauthorized road users is almost completely possible. National… | function unauthorized, unauthorized road, fine unauthorized | vehicle, device, road, axle, easy | 2 |
nextentservices.hu | Application security is designed to protect applications from cyber-attacks and unauthorized access. | attack unauthorized, unauthorized access | datum, solution, application, development, decision | 2 |
stylissimo.hu | All the images on this website are protected by copyright therefore not allowed for any other use without the written and preliminary permission of Stylissimo Kft. All unauthorized uses imply legal consequences. | kft unauthorized, unauthorized use | fashion, ildiko, personal, feature, theatre | 1 |
raszta.hu | A financial info room is mostly a secure place to store very sensitive paperwork and details, often with regards to legal actions or M&A transactions. It possesses a way to share files with multiple persons and watch user activity, while protecting information by unauthorized get. It also makes… | information unauthorized, unauthorized simple | datum, february, room, financial, provider | 1 |
seacon.hu | …in electronis form, such as contracts, blueprints, price lists, payroll lists, know-how, program codes, manufacturing instrucions, etc. The loss or unauthorized access of these information is results not only financial damages, but may indirectly risk the company’s good reputation and image. | loss unauthorized, unauthorized access | europe, product, datum, fleet, presentation | 1 |
motorvedolemez.hu | - Our gear protectors make it difficult for mechanical gear locks to gain unauthorized access to the gear linkage, thereby increasing the effectiveness of the locks. | lock unauthorized, unauthorized access | product, plate, skid, metal, term | 1 |
drmoreviktoria.hu | Representation in trademark-related – registration, extension, cancellation matters, drafting of licensing contracts for trademarks, representation in litigations in relation to the unauthorized use of trademarks | relation unauthorized, unauthorized use | law, representation, specialize, field, introduction | 1 |
nconnect.hu | NOWadays the biggest risks in IT Security are coming from data leakage - data stealing and from the vulnerable IT infrastructure. It is now a daily example in the media to hear about unauthorized data accesses, hijacked computers and complete IT systems, or similar technological abuses. These… | medium unauthorized, unauthorized datum | security, hack, intelligence, solution, hardware | 1 |
demifilm.hu | The page images and moving images are copyrighted! Unauthorized use is prosecuted entails! | image unauthorized, unauthorized use | dance, reference, gallery, advertising, summary | 1 |
okolakopark.hu | …unbreakable, non-combustible. It shelters against wind, dust, and possible extreme floodwaters, beneficially and effectively protects against unauthorized intrusion, either it is accidental or well-organized. This system perfectly hides all the inner parts of the ecovillage from the outside… | effectively unauthorized, unauthorized intrusion | model, house, plan, area, location | 1 |
nt.hu | WE UNDERSTAND THAT CONFIDENTIALITY AND THE PROTECTION OF YOUR PRIVACY IS IMPORTANT. IN ACCORDANCE WITH DATA PRIVACY LAWS WE DO NOT SHARE PERSONAL INFORMATION YOU PROVIDE US WITH ANY THIRD PARTIES. OUR SYSTEMS ARE DESIGNED TO PROTECT INFORMATION FROM UNAUTHORIZED ACCESS. | information unauthorized, unauthorized access | law, legal, firm, client, energy | 1 |
okopannon.hu | In the case of using the trademark in an unauthorized way, without a trademark licence contract, then using the trademark is considered a usurpation of trademark. To abolish the trademark usurpation, ÖKO-Pannon Nonprofit PLC can initiate a monitoring process and start a civil and criminal action. | trademark unauthorized, unauthorized way | trademark, product, packaging, charge, green | 1 |
patanegra.hu | Copyright Patanegra. All rights reserved. Any unauthorized copying of this webpage is prohibited! Privacy Policy | right unauthorized, unauthorized copy | spanish, quality, bar, heart, relaxed | 1 |
chillapartman.hu | Any person staying in the Apartment are not entitled to bring unauthorized guest(s) to stay in the Apartment. | apartment unauthorized, unauthorized apartment | apartment, shall, day, friend, vacation | 1 |
kh.hu | Unauthorized fraudsters may try to steal your data via email that appear to be sent by K&H | | account, loan, card, investment, saving | 1 |
mau.hu | We are committed to ensuring that your information is secure. To prevent unauthorized access or disclosure, we have put in place suitable physical, electronic, and managerial procedures to safeguard and secure the information we collect online. | secure unauthorized, unauthorized access | personal, europe, datum, career, website | 1 |
ajnasz.hu | As the main purpose of the application is to protect privacy and keep secret hidden from unauthorized third parties I made it as secure as possible: | secret unauthorized, unauthorized party | number, option, power, simple, file | 1 |
yourvoice.hu | End-to-end encrypted communication: provides a secure communication channel for everyone involved, preventing unauthorized access to the exchanged information. | channel unauthorized, unauthorized access | voice, report, fee, maintenance, employee | 1 |
asador.hu | Copyright Patanegra. All rights reserved. Any unauthorized copying of this webpage is prohibited! Privacy Policy | right unauthorized, unauthorized copy | spanish, quality, bar, heart, relaxed | 1 |
oaktree.hu | Adding customized proprietary security solutions to commercial layers to protect data in computer and communication systems from unauthorized disclosure and modification ... | system unauthorized, unauthorized disclosure | website, development, application, tree, oak | 1 |
elanhunting.hu | All rights reserved. Articles on this site, audio and video materials belong to Elan Tours SRO as an exclusive owners. In case of unauthorized use of these procedures will automatically be initiated in accordance with the Law on Copyright. | case unauthorized, unauthorized use | newsletter, news, travel, country, introduction | 1 |
hardening.hu | The installation and development of IT systems is often carried out by professionals who are often overloaded and constantly lacking time. This may lead to security gaps in the systems, with incorrect configurations, and "forgotten" sensitive data that can be accessed by unauthorized users. | datum unauthorized, unauthorized user | security, testing, vulnerability, reference, external | 1 |
huntingvideo.hu | In case of unauthorized use of these procedures will automatically be initiated in accordance with the Law on Copyright. | case unauthorized, unauthorized use | movie, picture, introduction, hunt, photograph | 1 |
andrassydental.hu | Choose us!… About Us… Our Team… Treatments… Our works… Guarantee… PPD… Prices… For Companies… Contact… | use unauthorized, unauthorized use | dental, guarantee, price, appointment, saving | 0 |
multilogkft.hu | Multilog Ltd. with 20 years of experience and innovative digital solutions, makes customs operations efficient and smooth. Please take a look at our services and contact us with confidence! | unauthorized use | custom, useful, operation, duty, representation | 0 |