Trying to learn how to translate from the human translation examples.
From professional translators, enterprises, web pages and freely available translation repositories.
participants shall implement adequate security controls to protect their systems from unauthorised access and use .
participants shall implement adequate security controls to protect their systems from unauthorised access and use .
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
helaas hebben we daardoor ook te maken met nieuwe uitdagingen, bijvoorbeeld e-criminaliteit, zoals 'unauthorised monitoring' (onbevoegde inzage en bewerking van communicatiemiddelen), fraude, cyberoorlogsvoering en nog vele andere misdrijven.
alas, it has also presented us with new challenges, including e-crimes such as unauthorised monitoring, fraud, cyber warfare and many more.
Last Update: 2012-02-29
Usage Frequency: 2
Quality: