Home

Results 21 - 30 of 23,235 for password. Search took 3.103 seconds.  
Sort by date/Sort by relevance
THE PRACTICE OF SAFE COMPUTING : INVITED PAPER / PREPARED AND SUBMITTED BY EDUARDO GELBSTEIN
Once inside someone else’s computer or network, they can steal data, including legitimate passwords, plant malicious code or simply cause chaos by modifying users’ access names and passwords, corporate data, websites. 36. (...) Memorising multiple passwords becomes a bigger headache unless you create a personal mnemonic system to assist in this. (...) Hiding your text or files with a password is a good practice but not necessarily a highly secure one.
Language:English
Score: 990265 - daccess-ods.un.org/acce...t?open&DS=CES/SEM.47/11&Lang=E
Data Source: ods
PROTECTION OF CONFIDENTIAL DATA IN PRATICAL WORK OF STATE STATISTICAL BODIES OF UKRAINE : SUPPORTING PAPER / SUBMITTED BY THE STATE STATISTICS COMMITTEE OF UKRAINE
Autonomous local networks providing access to databases through separate servers using a relevant system of passwords, thus eliminating access to the data from the outside, are developed for the purpose of automated processing of confidential information. In order to ensure sound data protection, special system tools and programs are used, in particular: · establishing service units for administration of networks, databases and data security with clear identification of their functions on the basis of relevant regulations on these units and job descriptions; · classification of users of the automated system by set of information, which prevents different users from working with the same set of data; · allocation of a unique code to each user and providing users with passwords for authorized access, coding of user’s passwords (number of symbols in password code and password itself could be different, thus preventing anyone who may possess the password code, even a system administrator, from identifying the original password); · restricting users’ possibilities in employing only those technical operations, which are specified for corresponding user category (e.g. only users from the group “scanning operator” could start modules for scanning and recording of document images); · registration of all user’s requests to databases; · central storage of copies of primary data at a separate server, putting a ban on downloading information from databases into PCs, excluding cases requesting implementation of concrete tasks linked with the technological process. 27.
Language:English
Score: 983443.2 - daccess-ods.un.org/acce...get?open&DS=CES/2003/32&Lang=E
Data Source: ods
REPORT : CONFERENCE OF THE PARTIES TO THE CONVENTION ON THE TRANSBOUNDARY EFFECTS OF INDUSTRIAL ACCIDENTS : 3RD CONSULTATION AND A TRAINING SESSION FOR POINTS OF CONTACT FOR THE PURPOSE OF ACCIDENT NOTIFICATION AND MUTUAL ASSISTANCE DESIGNATED WITHIN THE UNECE INDUSTRIAL ACCIDENT NOTIFICATION SYSTEM, SIBIU (ROMANIA), 1-3 APRIL 2008
You should receive an e-mail in a few days with a password. Once you have received your password it is advised that after logging in to the IAN System that you immediately change your password by clicking on the “Edit Account” link found at the top navigation section. (...) Scroll to the bottom of the form and click on the button “Change Password”. 3. Enter your current password in the first box. 4. Enter the new password. 5. Enter the new password again. 6. Press the button to change your password.
Language:English
Score: 977718.4 - daccess-ods.un.org/acce...CE/CP.TEIA/SEM.6/2008/2&Lang=E
Data Source: ods
REPORTING PURSUANT TO ARTICLE 15 OF THE CONVENTION
Each Party to the Convention has been assigned two individual accounts and passwords in order to access the electronic system for reporting. (...) The Secretariat has provided the individual user names and passwords of the relevant accounts to those Parties that have nominated official contact points pursuant to decision SC-2/16 on official communications with Parties and observers. (...) Four Parties out of the 55 Parties that were provided with individual user identifications and passwords reported difficulties when trying to use the electronic system for reporting.
Language:English
Score: 977007.2 - daccess-ods.un.org/acce...n&DS=UNEP/POPS/COP.3/21&Lang=E
Data Source: ods
LINK TO THE EUROSTAT COMEXT DATABASE USING THE ISDN CONNECTION (PILOT PROJECT) : CONTRIBUTED PAPER / SUBMITTED BY THE STATISTICAL OFFICE OF THE REPUBLIC OF SLOVENIA
• Chap protocol is used on the router. • Usual USERID/Password for the connection to the database. • Virtual Network Computing (VNC from ATT) is used at the communication server. (...) The user must then enter the usual USERID/password and if it is correct, he/she can start using the COMEXT program to access the COMEXT database, which is designed as a user-friendly spreadsheet program connected to the database. 7. (...) If all information is correct so far, the user is asked to login with the USERID/password. After a successful login, the user can start using the COMEXT database. 8.
Language:English
Score: 974880.5 - daccess-ods.un.org/acce...t?open&DS=CES/SEM.43/31&Lang=E
Data Source: ods
USING THE WEB IN COLLECTING DATA FOR BUSINESS STATISTICS IN FINLAND : INVITED PAPER / SUBMITTED BY STATISTICS FINLAND
Some examples are as follows: · new user IDs and passwords are given every year (old ones are discarded); · user IDs and passwords are initially sent in a letter. (...) In less repetitive surveys, testing with respondents is not viable; · the persons administering user IDs and passwords must be trained properly. Special attention should be placed on the design of the administration of user IDs, because each month there will be 1 to 3 per cent of the respondents who displace their user IDs and passwords; · the collection application should allow work to stop and continue later on. (...) User IDs and passwords are stored on a separate directory services server.
Language:English
Score: 973938.7 - daccess-ods.un.org/acce.../get?open&DS=CES/2005/8&Lang=E
Data Source: ods
On 12 September 2006, when asked by IGO, the Head of the North Africa Desk stated that she had given the password to her email account to her secretary, the Applicant and the Translated from French Case No. (...) At the time the events took place, there was no procedure governing the use of passwords. Despite the loopholes in the electronic security system at UNHCR, neither IGO nor the JDC considered the hypothesis that the password of the Head of the North Africa Desk had been misused by someone else. 23. (...) If, as the Applicant maintains, the fact that he had not installed a screen saver with a password meant that a third party entering his office could use his computer without his knowledge, the objection referred to above, that such third party would also have had to know his supervisor’s password, is equally valid here.
Language:English
Score: 971760.6 - www.un.org/en/internalj...t/judgments/undt-2011-056e.pdf
Data Source: oaj
FROM THE OPTICAL DISK SYSTEM TO THE OFFICIAL DOCUMENTS SYSTEM (ODS) : STATUS OF IMPLEMENTATION AND EVALUATION / PREPARED BY LOUIS-DOMINIQUE OUEDRAOGO
Since ODS has become fully operational, access to the system has been granted by way of user/subscriber registration and the allocation of a password. Access to the system is free for staff members of the Secretariat and for permanent missions, observer missions and other government offices of Member States, within a maximum allotment per Member State currently set at 40 passwords. Other United Nations system organizations have a very limited number of free passwords. For other users, access is available on a fee-for-service basis, as prescribed by General Assembly resolution 51/211 F of 15 September 1997 (paras. 29-31). (...) As of 28 August 2001, the limit on the number of allocated passwords went up from 10 to 20 per Member State, and it has recently been increased again to 40.
Language:English
Score: 962058.1 - daccess-ods.un.org/acce...?open&DS=JIU/REP/2003/3&Lang=E
Data Source: ods
REPORT OF THE JOINT INSPECTION UNIT ON "FROM THE OPTICAL DISK SYSTEM TO THE OFFICIAL DOCUMENT SYSTEM (ODS) : STATUS OF IMPLEMENTATION AND EVALUATION" : NOTE / BY THE SECRETARY-GENERAL
Since ODS has become fully operational, access to the system has been granted by way of user/subscriber registration and the allocation of a password. Access to the system is free for staff members of the Secretariat and for permanent missions, observer missions and other government offices of Member States, within a maximum allotment per Member State currently set at 40 passwords. Other United Nations system organizations have a very limited number of free passwords. For other users, access is available on a fee-for-service basis, as prescribed by General Assembly resolution 51/211 F of 15 September 1997 (paras. 29-31). (...) As of 28 August 2001, the limit on the number of allocated passwords went up from 10 to 20 per Member State, and it has recently been increased again to 40.
Language:English
Score: 962058.1 - daccess-ods.un.org/acce...sf/get?open&DS=A/58/435&Lang=E
Data Source: ods
Later that day, UNICEF changed the Applicant’s email account password and restricted the account to receiving and reading emails. 4. (...) The Respondent’s primary contentions may be summarized as follows: Prima facie unlawfulness a. Changing the password to access the Applicant’s official email account and limiting said account to receiving and reading email is not prima facie unlawful because these decisions resulted from the Applicant sending “highly inappropriate emails to (all) her UNICEF colleagues in the Private Fundraising and Partnerships Division (PFP)”; Case No. (...) Moreover, the matter is moot because appropriate action was taken to inform the Applicant of how to proceed to reset her password and regain access to her official email account; and Urgency and irreparable damage c.
Language:English
Score: 957517.4 - www.un.org/en/internalj...s/undt/orders/gva-2018-095.pdf
Data Source: oaj