Home

Results 31 - 40 of 22,681 for password. Search took 1.904 seconds.  
Sort by date/Sort by relevance
RAIL SECURITY
Access to the web platform will be restricted with personalized usernames and passwords. The focal points should protect their username and password and they should not share them with others. (...) The secretariat will perform any administration issue regarding the operation of the web platform such as usernames and passwords, creation of new pages in case new organizations / railway undertakings wish to participate etc.
Language:English
Score: 948751.9 - daccess-ods.un.org/acce...S=ECE/TRANS/SC.2/2014/2&Lang=E
Data Source: ods
HUMAN RESOURCES HANDBOOK / FROM THE ASSISTANT SECRETARY-GENERAL FOR HUMAN RESOURCES MANAGEMENT
For staff who do not have access to the Headquarters Intranet, the Handbook has been posted in a password protected area, which the user would access by first entering the following address: www.un.org/hr_handbook A prompt will appear, requesting a user name and a password. For the time being, and to allow for immediate availability to this new important working tool, the user should enter the word handbook in both the user name and password fields. 4. Access through Intranet is preferable, as it will allow full use of all the features of the Handbook, including links to sites available only through the Intranet, as is the case for the “Forms” site, and the use of additional search features not available through Internet.
Language:English
Score: 946634.2 - daccess-ods.un.org/acce...t?open&DS=ST/IC/2001/15&Lang=E
Data Source: ods
Later that day, UNICEF changed the Applicant’s email account password and restricted the account to receiving and reading emails. 4. (...) The Respondent’s primary contentions may be summarized as follows: Prima facie unlawfulness a. Changing the password to access the Applicant’s official email account and limiting said account to receiving and reading email is not prima facie unlawful because these decisions resulted from the Applicant sending “highly inappropriate emails to (all) her UNICEF colleagues in the Private Fundraising and Partnerships Division (PFP)”; Case No. (...) Moreover, the matter is moot because appropriate action was taken to inform the Applicant of how to proceed to reset her password and regain access to her official email account; and Urgency and irreparable damage c.
Language:English
Score: 945145.7 - www.un.org/en/internalj...s/undt/orders/gva-2018-095.pdf
Data Source: oaj
LEGAL ASPECTS OF ELECTRONIC COMMERCE : ELECTRONIC CONTRACTING : BACKGROUND INFORMATION : NOTE : ADDENDUM / BY THE SECRETARIAT
A number of countries have adopted the rule in article 13 of the Model Law, including the presumption of attribution established in paragraph 3 of that article.8 Some countries expressly refer to the use of codes, passwords or other means of identification as factors that create a presumption of authorship.9 There are also more general versions of article 13, in which the presumption created by proper verification through a previously agreed procedure is rephrased as an indication of elements that may be used for attribution purposes.10 12. (...) Claimants maintained that defendants were the buyer, as the highest bid for the goods had been authenticated with the defendant’s password and had been sent from the defendant’s e-mail address. (...) The courts have used various arguments to justify that position. For example, passwords were not reliable because anyone who knew the defendant’s password could have used its e-mail address from anywhere and participated in the auction using the defendant’s name,16 a risk that some courts, on the basis of expert advice on security threats to Internet communications networks, in particular through the use of so-called “Trojan horses” capable of “stealing” a person’s password, estimated as “very high”.17 The risk of unauthorized use of a person’s identification device (password) should be borne by the party that offered goods or services through a particular medium, as there was no legal presumption that messages sent through an Internet web site with recourse to a person’s access password to such web site were attributable to that person.18 Such a presumption might conceivably be attached to an “advance electronic signature”, as defined in law, but the holder of a simple “password” should not bear the risk of its being misused by unauthorized persons.19 17.
Language:English
Score: 938199 - daccess-ods.un.org/acce...CN.9/WG.IV/WP.104/ADD.3&Lang=E
Data Source: ods
Log in | Department of Economic and Social Affairs Skip to main content Welcome to the United Nations Department of Economic and Social Affairs Capacity Development Search the United Nations Submit Search A-Z Site Index Header-02-Main Menu Bar Home About Us Our Vision Our Divisions Capacity Development Programme Management Office Vacancies What We Do Areas of Work How we deliver Our Resources Projects Capacity Development Tools Work with Us Capacity Development Support Partnering Stories and Events Calendar of DESA events Digital Learning Centre Resident Coordinators System Evidence-based Policy Policy Coherence Social inclusion Institutions and integrated and inclusive approaches Means of Implementation Least Developed Countries (LDCs) Small Island Development States (SIDS) Primary tabs Log in (active tab) Reset your password Username Password Log in IMPORTANT LINKS DESA Highlights Report 2030 Agenda Addis Ababa Action Agenda Paris Agreement National Voluntary Reviews Quadrennial Comprehensive Policy Reviews Secure page for Demand Editors AREAS OF WORK Evidence-based Policy Institutions and integrated and inclusive approaches Means of Implementation Policy Coherence Social inclusion DESA DIVISIONS Office of Intergovernmental Support and Coordination for Sustainable Development Division for Inclusive Social Development Division for Sustainable Development Goals Statistics Division Population Division Economic Analysis and Policy Division Division for Public Institutions and Digital Government United Nations Forum on Forests Financing for Sustainable Development Office ABOUT US Capacity Development Programme Management Office Junior Professional Officers Fellowships Development Account Contact Us United Nations Donate facebook twitter youtube Footer-Bottom-UN Standard Privacy Links A-Z SITE INDEX CONTACT COPYRIGHT FAQ FRAUD ALERT PRIVACY NOTICE Terms of Use
Language:English
Score: 936104.3 - https://www.un.org/development/desa/cdpmo/user/login
Data Source: un
THE SECURITY MODEL FOR ELECTRONIC DATA REPORTING AT STATISTICS CANADA : INVITED PAPER / SUBMITTED BY STATISTICS CANADA
Respondents are authenticated on the system with a username and password. These credentials are issued to respondent through regular mail or e-mail. (...) The Agency has now modified this policy and respondents must create a password as soon as they enter the site, even if they are only downloading a blank questionnaire. 21. (...) Even in the original model where both username and password were issued, respondents could not retrieve information electronically unless they had modified their credentials by creating a new password.
Language:English
Score: 933264.8 - daccess-ods.un.org/acce...get?open&DS=CES/2005/10&Lang=E
Data Source: ods
DRAFT DECISION ON THE PRIORITIES, PROGRAMME OF WORK AND RESOURCES UNDER THE CONVENTION FOR 2007-2008 : ECONOMIC COMMISSION FOR EUROPE, CONFERENCE OF THE PARTIES TO THE CONVENTION ON THE TRANSBOUNDARY EFFECTS OF INDUSTRIAL ACCIDENTS / SUBMITTED BY THE BUREAU IN COOPERATION WITH THE CONVENTION'S SECRETARIAT
PROGRAMME AREA 1: Monitoring of and assistance in the implementation of the Convention 1.1 Implementation of the Convention 1.1.1 Maintenance of the list of competent authorities and of the password-protected folder containing national implementation reports within the Convention's website (secretariat); 1.1.2 Preparation of the fourth report on the implementation of the Convention (WGI); 1.1.3 Drawing up of draft conclusions and recommendations to strengthen the implementation of the Convention on the basis of the report on the Convention’s implementation (WGI). 1.2 Assistance to Parties in implementing the Convention and to Signatories and other UNECE member countries wishing to become a Party in ratifying the Convention 1.2.1 Completion of fact-finding missions to countries of Eastern Europe, Caucasus and Central Asia (EECCA) and South-East Europe (SEE) and reporting on their outcome to the Bureau (EECCA and SEE countries not yet visited/fact- finding teams/Bureau/WGI/secretariat); 1.2.2 Organization of needs-driven capacity-building activities within the assistance programme for the EECCA and SEE countries in accordance with the action plan for the programme’s implementation phase – ECE/CP.TEIA/2006/4 (Bureau/WGI/secretariat). ECE/CP.TEIA/2006/13 Page 5 Annex I PROGRAMME AREA 2: Scope of the Convention 2.1 Hazardous activities 2.1.1 Elaboration of guidance on the application of the amended annex I to the Convention (WGD/WGI/secretariat); 2.1.2 Maintenance of information on hazardous activities in a password-protected folder on the Convention’s website (WGI/secretariat). (...) Scope of the Convention 2.1 Hazardous activities 2.1.1 Elaboration of guidance on the application of the amended annex I to the Convention WGD/WGI Secretariat European Commission € 10,000 Better application of annex I 2.1.2 Maintenance of information on hazardous activities in a password-protected folder within the Convention’s website WGI All Parties/secretariat Information on hazardous activities 3.
Language:English
Score: 932047.95 - daccess-ods.un.org/acce...&DS=ECE/CP.TEIA/2006/13&Lang=E
Data Source: ods
LEGAL ISSUES RELATED TO IDENTITY MANAGEMENT AND TRUST SERVICES : TERMS AND CONCEPTS RELEVANT TO IDENTITY MANAGEMENT AND TRUST SERVICES
For example, entering a secret password that is associated with a username is assumed to authenticate that the individual entering the secret password is the person to whom the username was issued. (...) An active authenticator is usually something the subject knows (such as a secret password), something the subject has (such as a smartcard), or something the subject is (such as a photo or other biometric information), and is used to tie the subject to an identity credential. For example, a password functions as an authenticator for a username, a picture functions as an authenticator for a passport or driver’s license.
Language:English
Score: 921895 - https://daccess-ods.un.org/acc...&DS=A/CN.9/WG.IV/WP.143&Lang=E
Data Source: ods
TRADING PARTNER AGREEMENT / SUBMITTED BY ROSETTANET, EDIFICE, ESIA/EECA AND UN/CEFACT
Portal URL: https://………… Password Creation and Management Procedure: ………………………… e.g. (...) In private and public computer networks (including the Internet), Authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the User is authentic. (...) In private and public computer networks (including the Internet), Authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the User is authentic.
Language:English
Score: 919884.2 - daccess-ods.un.org/acce...DS=TRADE/CEFACT/2003/19&Lang=E
Data Source: ods
The WebEx system only send webinar link and password to registered email according to nomination/registration form. 4. The host will send the WebEx link and password to access the webinar. Kindly don’t share your password with anyone. 5.
Language:English
Score: 918574.8 - https://sdgs.un.org/sites/defa...ant%20Information-3Dec2020.pdf
Data Source: un