DRAFT DECISION ON THE PRIORITIES, PROGRAMME OF WORK AND RESOURCES UNDER THE CONVENTION FOR 2005-2006 : ECONOMIC COMMISSION FOR EUROPE, CONFERENCE OF THE PARTIES TO THE CONVENTION ON THE TRANSBOUNDARY EFFECTS OF INDUSTRIAL ACCIDENTS
The
Working Group’s reports on implementation will be publicly available on the Convention's web site
and the individual country reports will be available only to competent authorities through a password-
protected folder.
CP.TEIA/2004/6
Page 4
Annex I
1.2 Assistance to Parties in implementing the Convention and to Signatories and other
UNECE member countries wishing to become a Party in ratifying the Convention
Description: The Parties and other UNECE member countries are invited to report on the
accession/ratification and implementation of the Convention and on the difficulties that they have
encountered in this process. (...) Work to be undertaken: Information on hazardous activities will be maintained by the Working
Group on Implementation, with the assistance of the secretariat, on the basis of the individual country
implementation reports and made available to competent authorities through a password-protected
folder within the Convention’s web site. (...) Scope of the Convention
2.1 Hazardous activities
2.1.1 Maintenance of information on hazardous
activities in a password-protected folder within
the Convention’s web site
Working Group on
Implementation
All Parties/UNECE secretariat
Information on
hazardous activities
3.

Language:English
Score: 902081.6
-
daccess-ods.un.org/acce...?open&DS=CP.TEIA/2004/6&Lang=E
Data Source: ods
DRAFT LEGAL GUIDE ON ELECTRONIC FUNDS TRANSFERS : REPORT OF THE SECRETARY-GENERAL
In some proposed home banking systems it would not be feasible to use a
plastic card for authorization purposes; therefore, the authorization
procedure depends ona PIN or password alone. A terminal located at a
business establishment can have more complicated and presumably more secure
procedures,. but in essence they usually revolve around the use of passwords
and the possible Use of 8' plastic card.
18. (...) C)'250/Add.A' ,
English
Page 8 .,.,
20. Password secu.rity eoz,-,terminalslocated,in businesses or- in homes raises
the same kind of problem. (...) A
terminal from which a wide range o~ funds .transfers·can .bemade for
significant amounts of money should be subject to additional.safeguard••
Log-in might require the c,oncurrenee of two different persons with different
passwords. Passwords can be changed at.relatively short·intervals ..
Language:English
Score: 900594.7
-
daccess-ods.un.org/acce...pen&DS=A/CN.9/250/ADD.4&Lang=E
Data Source: ods
REGISTRATION OF SECURITY RIGHTS IN MOVABLE ASSETS : DRAFT MODEL REGULATIONS : NOTE : ADDENDUM / BY THE SECRETARIAT
The
Working Group may also wish to note that, while regulations may normally be
updated frequently, the exact meaning of the terms “user identification” and
“password” may be left to user agreements.]
II. (...) Registration of information in a notice effected by a person using the assigned
user identification and password is conclusively deemed to have been effected by
the person to whom the user identification and password have been assigned by the
registry.
3. (...) [Note to the Working Group: The Working Group may wish to consider
whether the grantor identifier is necessary for a registrant that has obtained access
to the registry (with his/her user identification and password, that may apply in an
electronic or paper context), and has the relevant registration number.]
Language:English
Score: 900115.8
-
daccess-ods.un.org/acce.../CN.9/WG.VI/WP.46/ADD.3&Lang=E
Data Source: ods
POSSIBLE FUTURE WORK ON ELECTRONIC COMMERCE : COMPREHENSIVE REFERENCE DOCUMENT ON ELEMENTS REQUIRED TO ESTABLISH A FAVOURABLE LEGAL FRAMEWORK FOR ELECTRONIC COMMERCE : SAMPLE CHAPTER ON INTERNATIONAL USE OF ELECTRONIC AUTHENTICATION AND SIGNATURE METHODS : ADDENDUM
Biometrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30-40 13
3. Passwords and hybrid methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41-42 15
4. (...) For the purposes of this discussion, four main signature and authentication
methods will be discussed: digital signatures; biometric methods; passwords and
hybrid methods; and scanned or typed signatures.
1. (...) For example, signature
dynamics for authentication can be combined with cryptography for message
integrity. Alternatively, passwords can be passed over the Internet, using
cryptography (e.g.
Language:English
Score: 900115.8
-
daccess-ods.un.org/acce...pen&DS=A/CN.9/630/ADD.1&Lang=E
Data Source: ods
INTERNATIONAL TRANSPORT INFRASTRUCTURE OBSERVATORY - PURPOSE, FUNCTIONS, USER GROUPS AND OPERATIONAL MODALITIES
Only accredited Government representatives/ national focal points are granted access to the
observatory with a username / password.
10. Government users benefit from the following functionalities:
A. (...) Similar to Government users, also accredited users from MDBs and other interested
donors will receive their own password / username in order to access and navigate the
observatory and use its functions. (...) Similar to Government and MDB users, also accredited users from RCOs will receive
their own password / username and credentials for the Observatory.
15.
Language:English
Score: 899063.9
-
https://daccess-ods.un.org/acc...S=ECE/TRANS/WP.5/2021/4&Lang=E
Data Source: ods
INTERNATIONAL TRANSPORT INFRASTRUCTURE OBSERVATORY – A USER MANUAL AND USER EXPERIENCE SURVEY
For Governments, MDBs and RCOs access will be granted to officially
nominated/ accredited representatives only. A username and password will be provided only
after receipt of nominations by the secretariat. (...) Only
accredited Government representatives/ national focal points are granted access to the
observatory with a username / password.
11. Government users benefit from the following functionalities:
1. (...) Similar to Government and MDB users, also accredited users from RCOs will receive
their own password / username and credentials for the Observatory.
17.
Language:English
Score: 899063.9
-
https://daccess-ods.un.org/acc...S=ECE/TRANS/WP.5/2022/3&Lang=E
Data Source: ods
REPORT OF THE SESSION HELD IN GENEVA FROM 13 TO 23 SEPTEMBER 2005 : ECONOMIC COMMISSION FOR EUROPE, INLAND TRANSPORT COMMITTEE, WORKING PARTY ON THE TRANSPORT OF DANGEROUS GOODS, JOINT MEETING OF THE RID SAFETY COMMITTEE AND THE WORKING PARTY ON THE TRANSPORT OF DANGEROUS GOODS : ADDENDUM 3
GE.06-20632
TRANS/WP.15/AC.1/100/Add.3
page 2
Step 2
Draft standards ready for the Enquiry stage will be uploaded to a password protected
CEN website accessible only to the members of the Joint Meeting Working Group on Standards
and to the delegates of the Joint Meeting. (...) Draft standards ready for the Enquiry stage will be uploaded to a password protected
CEN website accessible only to the members of the Working Group on Standards and to the
delegates of the Joint Meeting.
Language:English
Score: 897721.5
-
daccess-ods.un.org/acce...NS/WP.15/AC.1/100/ADD.3&Lang=E
Data Source: ods
ENCRYPTION ON LAPTOP COMPUTERS : CONTRIBUTED PAPER : SUMMARY / SUBMITTED BY STATISTICS SWEDEN
· Weak security: Keys are derived from passwords or pass-phrases. Dictionary attacks can easily
breach this kind of security if easy to remember passwords are used
Language:English
Score: 894880.7
-
daccess-ods.un.org/acce...=CES/SEM.47/13(SUMMARY)&Lang=E
Data Source: ods
CAPI SYSTEM AT CENTRAL STATISTICAL BUREAU OF LATVIA : SUPPORTING PAPER : SUMMARY / PREPARED BY NORBERTS TALERS, CENTRAL STATISTICAL BUREAU OF LATVIA
Technically, a script is activating the GPRS connection on the laptop, connecting to an
FTP server at the CSB, and downloading a password-protected zip file, from which the received
data is extracted. (...) Scripts are collecting the files to be transferred, they zip
them in a password-protected archive and put then on an FTP server at CSB office.
8.
Language:English
Score: 894880.7
-
daccess-ods.un.org/acce.../CES/SEM.54/24(SUMMARY)&Lang=E
Data Source: ods
RESULTS OF THE SURVEYS CONDUCTED BY THE INFORMAL AD HOC EXPERT GROUP ON CONCEPTUAL AND TECHNICAL ASPECTS OF COMPUTERIZATION OF THE TIR PROCEDURE
The holder is provided with login
and password for authentication. Without these, there is no method to submit declarations
in Latvia. (...) In DTI, a simpler level of authentication (login / password), combined with user
profiles management, can be sufficient.
(...) In order to submit Customs declarations
(including Transit and TIR declarations), the user’s login and password is used as electronic
signature. There is no need to attach further specific files.
Language:English
Score: 894472.9
-
daccess-ods.un.org/acce...TRANS/WP.30/GE.2/2016/1&Lang=E
Data Source: ods