Home

Results 41 - 50 of 23,235 for password. Search took 3.65 seconds.  
Sort by date/Sort by relevance
INTEGRITY AWARENESS INITIATIVE
Staff can log in using their Index Number and e-PAS password, and non-staff can use the generic login/password: iaol/guest.
Language:English
Score: 919478.6 - daccess-ods.un.org/acce...?open&DS=ST/SGB/2005/17&Lang=E
Data Source: ods
Verification ID and password specified below are required in using AMARYS. (...) kb=A&g=1 Verification ID: toyota2015 Verification Password: toyota2015 Note: you will be required to set your own Log-in ID and password differently from the ID and the password designated above.
Language:English
Score: 919131.1 - https://sdgs.un.org/sites/defa...uments/5545toyotalogistics.pdf
Data Source: un
THE USE OF A DATA CAPTURE TOOL IN STATISTICAL SURVEYS ON ENTERPRISES : CONTRIBUTED PAPER / SUBMITTED BY THE NATIONAL INSTITUTE OF STATISTICS, ITALY
Further descriptive data of the surveys treated in experimental way are reported below: Mail Fax Mail server Directory Scanner Verifier Reader Database Image Storage Fax Server Directory img Control Center Web Server cgi/ASP Designer CES/AC.71/2004/7 page 4 Survey on retail sales Frequency Monthly Number of forms 2 Number of form pages 3 Respondents Commerce branch enterprises (small, medium and large enterprises) Theoretic number of respondents 2,700 Technologies for data collection Mail, Web, Fax-server Channels used by the respondents: Web: 4% Mail: 21.2% Fax: 74.8% Monitoring of returned data Yes Security procedures Access control (User-id and password) Survey on Telecommunications Frequency Annual Number of forms 3 Number of form pages 3 Respondents Telecommunications enterprises Theoretic number of respondents 534 Technologies for data collection Mail, Web, E-mail, Fax-server, Fax Channels used by the respondents Web 10% Fax and Fax – server 90% Monitoring of returned data Yes Security procedures Access control (User-id and password) Survey on employment, working time and salary Frequency Monthly Number of forms 2 Number of form pages 3 Respondents Large enterprises (more than 500 employees) Theoretic number of respondents 1,500 Technologies for data capturing Mail, Web, E-mail, Fax-server, Fax Channels used by the respondents Web 10% Fax and Fax – server 90% Monitoring of returned data Yes Security procedures Access control (User-id and password) Survey on vacancies and worked hours Frequency Quarterly Number of forms 1 Number of form pages 4 Respondents Commerce branch enterprises (small-medium-large enterprises) Theoretic number of respondents 8,000 Technologies for data capturing Mail, Web, E-mail., Fax-server, Fax Channels used by the respondents Web 10% Fax and Fax – server 90% Monitoring of returned data Yes Security procedures Access control (User-id and password); SSL CES/AC.71/2004/7 page 5 IV. (...) The Control Center allows system administrators to: § view work in process and overall system performance; § view and monitor operator performance and throughput in real time; § make changes to system-wide and operator/workstation settings; § control the priority of work and escalate specific batches for immediate processing; § maintain system security, assigning operator logins and passwords; § configure alerts that will highlight specific throughput or processing issues for immediate attention; § generate extensive reports on system and operator performance; CES/AC.71/2004/7 page 8 § alert notification via email, command line execution, and/or NT event log .
Language:English
Score: 917574 - daccess-ods.un.org/acce...pen&DS=CES/AC.71/2004/7&Lang=E
Data Source: ods
IMPACT OF NEW INFORMATION TECHNOLOGIES ON DATA COLLECTION AT STATISTICS SWEDEN : INVITED PAPER / SUBMITTED BY STATISTICS SWEDEN
The most common implementation of authentication is the use of passwords and the most common form of security breach is the compromising of these passwords. Using strong authentication and electronic identity cards or single-use password devices are some of the steps that can be used to prevent unauthorised access to sensitive information. (...) The respondents at organisations or enterprises use passwords as authentication. SSL is activated through a certificate that is installed on our web server.
Language:English
Score: 917528.3 - daccess-ods.un.org/acce...t?open&DS=CES/SEM.43/19&Lang=E
Data Source: ods
REPORT OF WORKING GROUP VI (SECURITY INTERESTS) ON THE WORK OF ITS 19TH SESSION (NEW YORK, 11-15 APRIL 2011)
With respect to article 1, definitions, a number of suggestions were made, including the following: (a) In the definition of the term “address”: (i) it might be better to require a physical address for the grantor and a post office box or e-mail for the secured creditor; (ii) reference should be made to “postal” rather than “zip” code; and (iii) the fact should be taken into account that, in some States, address might be reflected in more general terms (for example, town or island rather than street address); (b) In the definition of the term “amendment”: (i) it should be clarified by listing examples of amendments; (ii) the definition should be aligned with articles 27 and 28; and (iii) it should be clarified whether the term meant a notification, the information changed or the result of the change of the information; (c) With respect to the meaning of the terms “security right” and “movable asset” in the definition of the term “law”, it was noted that those terms did not need to be defined as they were explained either in the terminology or in the recommendations of the Guide; (d) In the definition of the term “notice”, reference should be made to recommendations 72-75; (e) In the definition of the term “password”, the word “confidential” should be deleted since, even if there was a breach of confidentiality, the password would still be a password (the matter could be dealt by way of a provision that that the password should be kept confidential); (f) Consideration might be given to combining the definitions of the terms “registration” and “registry record”; (g) The definitions of the terms “official search logic”, “registry”, “registry services” and “registry system” should be deleted as the meaning of those terms was self-evident; (h) The terms “serial number” and “serial number assets”, which were said to be overly restrictive, should be considered only if the Working Group decided that the articles in which those terms appeared should be retained; and (i) The definition of the term “user identification”, which was not clear as to whether it meant only a registrant or also a searcher, should be considered in the context of the articles in which that term was used. (...) (c)); 18 V.11-82575 A/CN.9/719 (c) A distinction between occasional users and frequent users was only applicable to registrants and accordingly, paragraph 2 should be recast to clarify that it applied to frequent registrants only; (d) A user identification and password could be assigned to registrants that needed such arrangements but were not necessary for searchers; and (e) Assigning a user identification and password should not be presented as the only method for granting access to registry services as other methods were presently available or might become available in the future. 55. With respect to article 9, it was stated that the registry should be able to rely on the fact that the user identification and password were properly used and the registrant was their rightful owner.
Language:English
Score: 917452.2 - daccess-ods.un.org/acce.../get?open&DS=A/CN.9/719&Lang=E
Data Source: ods
OVERVIEW OF IDENTITY MANAGEMENT : BACKGROUND PAPER SUBMITTED BY THE IDENTITY MANAGEMENT LEGAL TASK FORCE OF THE AMERICAN BAR ASSOCIATION : NOTE / BY THE SECRETARIAT
Every entity that engages in digital transactions could set up its own system to identify and authenticate each of its business partners (as many businesses currently do through the use of individual registration processes coupled with a username and password system), but this is increasingly proving expensive and inadequate, producing challenges to scaling the system to broader populations. Moreover, the increasing need for cross-organization collaboration, concerns about security, and the problem of user password management suggest that the traditional company- issued or vendor-issued username and password approach is no longer adequate. 10. (...) For example, a business would identify an employee, and issue him a username and password so he could access the company’s network.
Language:English
Score: 911553.5 - daccess-ods.un.org/acce...&DS=A/CN.9/WG.IV/WP.120&Lang=E
Data Source: ods
LEGAL ISSUES RELATED TO IDENTITY MANAGEMENT AND TRUST SERVICES : WORKING GROUP IV (ELECTRONIC COMMERCE) : 56TH SESSION : NEW YORK, 16–20 APRIL 2018
For example, entering a secret password that is associated with a username is assumed to authenticate that the individual entering the secret password is the person to whom the username was issued. (...) An active authenticator is usually something the subject knows (such as a secret password), something the subject has (such as a smartcard), or something the subject is (such as a photo or other biometric information), an d is used to tie the subject to an identity credential. For example, a password functions as an authenticator for a username, a picture functions as an authenticator for a passport or driver’s license.
Language:English
Score: 909654 - https://daccess-ods.un.org/acc...&DS=A/CN.9/WG.IV/WP.150&Lang=E
Data Source: ods
EXPLORATORY WORK ON THE IMPACT OF COVID-19 ON INTERNATIONAL TRADE LAW
The assessment was conducted on the five models described in paragraphs 4 to 7 of the Note of the Secretariat (A/CN.9/1081), namely (i) a dedicated page on the UNCITRAL website which could be used to post materials submitted by States; (ii) the posting of materials on existing password-protected pages, hosted on an external website; (iii) a new information repository system modelled after the existing Transparency Registry and the CLOUT system; (iv) an entirely new web-based system for the purpose of exchanging materials among States; and (v) round -table sessions or virtual panel series organized by the secretariat using a collaboration platform. __________________ 18 Official Records of the General Assembly, Seventy-fifth Session, Supplement No. 17 (A/75/17, part two). 19 See A/CN.9/1091, report under preparation. 20 See the report of Working Group II (Dispute Settlement) on the work of its seventy -second session (Vienna, 21–25 September 2020) (A/CN.9/1043), para. 95. 21 See report of Working Group II (Dispute Settlement) on the work of its seventy -third session (New York (online), 22–26 March 2021) (A/CN.9/1049), para. 69. 22 See resolution 76/117 of 17 December 2021 on the rule of law at the national and international levels, para. 2. (...) The second model, using a dedicated password-protected page hosted on an external website to post materials submitted by States, is as efficient as the first model. (...) A /C N .9 /1 1 1 9 1 0 /1 1 V .2 2 -0 2 6 1 8 Annex Systems and Software Quality Requirements and Evaluation (ISO/IEC 25010:2011(en), Systems and software engineering – Systems and software Quality Requirements and Evaluation (SQuaRE) – System and software quality models) A dedicated page on the UNCITRAL website which could be used to post (password-protected) materials submitted by States A dedicated password-protected page hosted on an external website which could be used to post materials submitted by States A new information repository system modelled on the existing Transparency Registry and the CLOUT system A new web-based system A collaboration platform Examples www.uncitral.un.org www.unodc.org/missions/en/uncitral/i nformation.html www.uncitral.org/transparency- registry/registry/index.jspx (Transparency Registry) www.uncitral.org/clout/ (CLOUT Document Database) • SparkBlue: SparkBlue is UNDP's digital platform for online engagement allowing its staff to collaborate across the international development landscape • Microsoft Teams Analysis Para. 5, A/CN.9/1081 (regarding an open website option) Para. 5, A/CN.9/1081 Para. 6, A/CN.9/1081 F u n c ti o n a l su it a b il it y Degree to which a product or system provides functions that meet stated and implied needs Low Low Medium High High • No real time interaction • Basic functionality • No real time interaction • Basic functionality • No real time interaction • Limited functionality • Real time interaction • Advanced functionality • Real time interaction • Advanced functionality P e r fo r m a n c e e ff ic ie n c y Performance relative to the amount of resources used High High Low Low Medium • No development costs • No licensing fees • No maintenance costs • No additional human resource implications • No development costs • No licensing fees • No maintenance costs • No additional human resource implications • Significant development costs • Licensing fees • Maintenance costs • Additional human resource implications • Significant development costs • Licensing fees • Maintenance costs • Additional human resource implications • No Development costs • Licensing fees • Maintenance costs • Additional human resource implications C o m p a ti b il it y Degree to which a system can exchange information with other systems and/or perform its required functions High Low Medium Medium High • Up-to-date content management system with interfaces • Legacy content management system • Tailor-made content management system • Customizable as required • Tailor-made content management system • Customizable as required • Up-to-date collaboration system with interfaces U sa b il it y Degree to which a product or system can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction High Low Medium Medium High • User-friendly • Responsive Design • Out of date user-interface • No responsive design • Tailor-made usability • Customizable as required • Tailor-made usability • Customizable as required • User-friendly • Responsive design A /C N .9 /1 1 1 9 V .2 2 -0 2 6 1 8 1 1 /1 1 A dedicated page on the UNCITRAL website which could be used to post (password-protected) materials submitted by States A dedicated password-protected page hosted on an external website which could be used to post materials submitted by States A new information repository system modelled on the existing Transparency Registry and the CLOUT system A new web-based system A collaboration platform R e li a b il it y Degree to which a system performs specified functions under specified conditions for a specified period of time High Low Medium Medium High • Maintained by IT specialists • Regular updates • Support • Legacy system phasing out • No updates • No support • Maintained by IT specialists • Updates on request • Limited support • Maintained by IT specialists • Updates on request • Limited support • Maintained by IT specialists • Regular software updates • Support S e c u r it y Degree to which a system protects information and data so that persons or systems have the degree of data access appropriate to their types and levels of authorization Low Low Low Medium High • No access-control • No security and compliance capabilities • Not suitable for sensitive or highly confidential data • Simple access control • No security and compliance capabilities • Not suitable for sensitive or highly confidential data • Simple access control • Basic security and compliance capabilities • Not suitable for sensitive or highly confidential data • Advanced multi-user access control • Basic security and compliance capabilities • Suitable for sensitive or highly confidential data • Advanced multi-user access control • Advanced security and compliance capabilities • Suitable for sensitive or highly confidential data M a in ta in a b il it y Degree of effectiveness and efficiency with which a product or system can be modified by the intended maintainers High Low Medium Medium High • Basic training for maintenance required • Advanced training for maintenance required • Training for maintenance required • Training for maintenance required • Basic training for maintenance required P o r ta b il it y Degree of effectiveness and efficiency with which a system can be transferred from one software environment to another High Low Medium Medium High • Up-to-date proprietary system with broad support • Legacy system • Specialized tailor-made system based on modern technology • Specialized tailor-made system based on modern technology • Up-to-date proprietary system with broad support
Language:English
Score: 909654 - https://daccess-ods.un.org/acc...get?open&DS=A/CN.9/1119&Lang=E
Data Source: ods
REGISTRATION OF SECURITY RIGHTS IN MOVABLE ASSETS : MODEL REGULATIONS : NOTE : ADDENDUM / BY THE SECRETARIAT
The Registrar must assign a user identification number (user ID) and a password to a person referred to in paragraph 1 of this article, provided that: __________________ 11 See the Guide, recommendation 74. (...) A person who has been assigned a user ID and a password by the Registry and who has complied with these Regulations may have electronic access to the Registry to effect a registration, amendment or cancellation of a notice. Registration, amendment or cancellation of a notice effected using the assigned user ID and password is conclusively deemed to have been effected by the person to whom the user ID and password have been assigned by the Registry.
Language:English
Score: 904080 - daccess-ods.un.org/acce.../CN.9/WG.VI/WP.44/ADD.2&Lang=E
Data Source: ods
THE PROBLEMS CONNECTED WITH SECURITY OF DATA TRANSFER VIA NETWORK AND THE SOLUTIONS IMPLEMENTED IN THE CSO OF POLAND : CONTRIBUTED PAPER : SUMMARY / SUBMITTED BY POLISH CENTRAL STATISTICAL OFFICE
Possible problems in the breach of security of data in computer networks can be divided into three main categories: ¨ intentional breach of security – the theft of an inscription key, or tapping of a network connection; ¨ unauthorized data access - by logging in using a stolen or guessed password; ¨ denial of service – due to the breach of security system, users can not use a given or all services of the network or server. 4. The basic techniques already in use or planned to be used to ensure network security are: identification (users are identified through a password), authentication (verification of user’s identity), authorization and access control (assigning access rights to a user), protecting the confidentiality of information, data integrity (ensuring that the document was not modified during transfer) and digital signatures. 5.
Language:English
Score: 903316.6 - daccess-ods.un.org/acce.../AC.71/2001/17(SUMMARY)&Lang=E
Data Source: ods