Home

Results 61 - 70 of 22,658 for password. Search took 3.449 seconds.  
Sort by date/Sort by relevance
Replacement of: PDU ::= CHOICE { FTAM-Regime-PDU, File-PDU, Bulk-Data-PDU, FSM-PDU} With: PDU ::= CHOICE { fTAM-Regime-PDU FTAM-Regime-PDU, file-PDU File-PDU, bulk-Data-PDU Bulk-Data-PDU, fSM-PDU FSM-PDU} 3. Replacement of: Password ::= [APPLICATION 17] CHOICE { GraphicString, OCTET STRING } With: Password ::= [APPLICATION 17] CHOICE { graphicString GraphicString, octetString OCTET STRING } 4. (...) Replacement of: Access-Passwords ::= [APPLICATION 2] IMPLICIT SEQUENCE { read-password [0] IMPLICIT Password, insert-password [1] IMPLICIT Password, replace-password [2] IMPLICIT Password, extend-password [3] IMPLICIT Password, erase-password [4] IMPLICIT Password, read-attribute-password [5] IMPLICIT Password, change-attribute-password [6] IMPLICIT Password, delete-password [7] IMPLICIT Password, pass-passwords [8] IMPLICIT Pass-Passwords OPTIONAL, link-password [9] IMPLICIT Password OPTIONAL } With: Access-Passwords ::= [APPLICATION 2] IMPLICIT SEQUENCE { read-password [0] Password, insert-password [1] Password, replace-password [2] Password, extend-password [3] Password, erase-password [4] Password, read-attribute-password [5] Password, change-attribute-password [6] Password, delete-password [7] Password, pass-passwords [8] IMPLICIT Pass-Passwords OPTIONAL, link-password [9] Password OPTIONAL }
Language:English
Score: 889191.1 - https://www.itu.int/wftp3/Publ...l/iso/8571-4/1988/CHANGES.html
Data Source: un
RESULTS OF THE 2ND MEETING OF THE INTERGOVERNMENTAL EXPERT GROUP TO PREPARE A STUDY ON FRAUD AND THE CRIMINAL MISUSE AND FALSIFICATION OF IDENTITY : REPORT OF THE SECRETARY-GENERAL : ADDENDUM
For electronic systems, information included either full names or abbreviated user names, passwords, personal identification numbers (PIN), transaction authentication numbers (TAN) and digital signatures and other cryptographic applications. (...) The most commonly used method was “phishing”, or “pharming”, in which users of computer networks were deceived into providing offenders with user names, passwords and other electronic identification information. (...) In other States, that activity might also be covered by more general cybercrime legislation, such as that covering the theft or illicit possession of passwords. IV. The relationship between identity-related crime and other factors A.
Language:English
Score: 887524.5 - daccess-ods.un.org/acce...DS=E/CN.15/2007/8/ADD.3&Lang=E
Data Source: ods
INTERNATIONAL TRANSPORT INFRASTRUCTURE OBSERVATORY/ITIO - PURPOSE, FUNCTIONS, USER GROUPS AND OPERATIONAL MODALITIES
For Governments, MDBs and RCOs access will be granted to officially nominated/ accredited representatives only. A username and password will be provided only after receipt of nominations by the secretariat. (...) Similar to Government users, also accredited users from MDBs and other interested donors will receive their own password / username in order to access and navigate the observatory and use its functions. (...) Similar to Government and MDB users, also accredited users from RCOs will receive their own password / username and credentials for the Observatory. 16.
Language:English
Score: 886264.3 - https://daccess-ods.un.org/acc...en&DS=ECE/TRANS/2022/20&Lang=E
Data Source: ods
CLEARING HOUSE ON TRANSPORT, ENVIRONMENT AND HEALTH (THE PEP CLEARING HOUSE) : IMPLEMENTATION AND PILOT OPERATION PHASES : ADDENDUM 1 : NOTE / BY THE SECRETARIAT
The United Nations does not collect personal information, passwords, or other details to be used for other than their intended purpose. (...) The User’s account containing his/her personal information is password protected. Only third parties that login with the User’s password can access his/her account. 24. Please remember that Users play a valuable part in security as well. The password to access the User’s account, selected at registration, should never be shared with anyone else and should be changed frequently.
Language:English
Score: 886264.3 - HTTP://DACCESS-ODS.UN.ORG/ACCE...=ECE/AC.21/2005/3/ADD.1&LANG=E
Data Source: ods
THE DUTCH ANNUAL BUSINESS INQUIRY : DEVELOPING AND TESTING THE ELECTRONIC FORM : INVITED PAPER / SUBMITTED BY STATISTICS NETHERLANDS
In wave 3, however, respondents first had to log in to the questionnaire by means of a username, a password and an additional security code. This procedure did not cause any trouble, except for the use of the additional code, which was supposed to prevent unauthorized logging in to the questionnaire with a hacked username and password. (...) When this site is a personal site, it should be secured by a username and a password, for example. The download and install procedures should preferably be in accordance with known conventions as used by MS-Windows. (...) A respondent will then be asked whether he would like to protect the questionnaire with a username and password so that unauthorized personnel can not open it.
Language:English
Score: 886264.3 - daccess-ods.un.org/acce...get?open&DS=CES/2005/16&Lang=E
Data Source: ods
TACHONET
locale=en:, and shall enter the username ‘sbca/CEF_eDelivery.europa.eu’ and the password ‘digit.333’credentials (username/password) received from the Certification Authority PKI system for the user portal. (...) (Used for the Power of Attorney) + Commercial Register No (only mandatory for private organisations) Entered at the Local Court of (only required for German and Austrian private organisations) Revocation password Mandatory field chosen by the requestor Revocation password repetition Mandatory field chosen by the requestor repeated (d) The selected key length shall be 2048(High Grade). (...) locale=en and shall log in with the credentials (username/password) received from the Certification Authority PKI system for the user portalusername "sbca/CEF_eDelivery.europa.eu" and the password "digit.333". 2.2.6.34.
Language:English
Score: 885139.3 - https://daccess-ods.un.org/acc...SC.1/GE.21/2019/1/REV.3&Lang=E
Data Source: ods
USE OF THE TIR DATABANK : NOTE / BY THE TIR SECRETARY
Each authorized ITDB user will receive a user name and a password, which will be indicated and verified before any consultation of the ITDB. (...) It goes without saying, however, that the user name and the password mentioned in paragraph 9 above will be verified by the TIR secretariat prior to replying to any enquiry in any form. (...) Access to the ITDB is protected and restricted to authorized users. Password and username are confidential information for the use of authorized users only. 3.
Language:English
Score: 883337.5 - daccess-ods.un.org/acce...RANS/WP.30/AC.2/2001/13&Lang=E
Data Source: ods
All rights reserved. 2 Forgot Your Password 1. If you have forgotten your password and would like to reset it, click on the link: . (...) Enter a password of your choice in the New Password box. 3. Repeat the password of your choice in the Confirm Password box. 4.
Language:English
Score: 881341.1 - https://www.itu.int/en/ties-se...20Forgotten%20Password_new.pdf
Data Source: un
DRAFT DECISION ON REPORTING REQUIREMENTS UNDER THE CONVENTION
.: General 7 September 2016 Original: English ECE/CP.TEIA/2016/12 2 Recognizing the difficulties experienced by Parties, committed countries and other reporting countries to comply with the biennial reporting deadline in January of every even year, leaving only one month after the end of the reporting period to submit a national implementation report, Bearing in mind the short time frame for the Working Group on Implementation to analyse and evaluate the national implementation reports and to compile an overall report on the implementation of the Convention in the same year, Taking note of the potential for reducing the reporting burden on many Parties through aligning reporting cycles with those under other international obligations on industrial safety, Recognizing the expanded tasks of the Working Group on Implementation, as reflected also in its updated terms of reference,1 and the Working Group’s workload related to the implementation of these tasks, Stressing the importance of Parties, committed countries and other reporting countries providing qualitative information in their implementation reports, which are made available on a password-protected web page to Parties, committed countries and other reporting countries, 1. (...) Decides to continue its practice of maintaining the confidentiality of sensitive information provided in the national implementation reports, and therefore that they are made available only through a password-protected web page to Parties, committed countries and other reporting countries.
Language:English
Score: 879706.2 - daccess-ods.un.org/acce...&DS=ECE/CP.TEIA/2016/12&Lang=E
Data Source: ods
How to Log In Go to the Log In page found on the top right corner of the UNDB website. Note: If your password is accepted, there will be an indicator at the top right corner of the Password field that displays your password strength. (...) Enter your password in the Current Password field. Choose a secure password that fulfills the requirements, as shown in the image below, and enter it in the Password field. Enter the new password again in the Confirm password field. How to Edit your Profile After changing the password, fill up the required fields that are marked by an asterisk.
Language:English
Score: 877807.4 - https://devbusiness.un.org/sit...%20time%20log%20in_final_0.pdf
Data Source: un