隱私部分 的英文怎麼說

中文拼音 [yǐnfēn]
隱私部分 英文
private parts
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : Ⅰ形容詞1 (個人的) personal; private 2 (自私) selfish 3 (暗地裡; 私下) secret; private 4 (...
  • : Ⅰ名詞1 (部分; 部位) part; section; division; region 2 (部門; 機關或組織單位的名稱) unit; mini...
  • : 分Ⅰ名詞1. (成分) component 2. (職責和權利的限度) what is within one's duty or rights Ⅱ同 「份」Ⅲ動詞[書面語] (料想) judge
  • 隱私 : 1. (隱蔽不外露) conceal; hide2. (秘密事) secret; one's secrets; private matters one wants to hide
  • 部分 : (整體中的局部或個體) part; section; portion
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內缺陷等進行析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. Furthermore, since computers have entered into all fields of people ' s life through network, when people use their computers consciously ( thinking of person ' s privacy as other working information and inputting them, such as home address, telephone numbers for shopping through network ), or unconsciously ( when using computers normally, people are not aware that he is putting his personal records into his computer, such as personal letters, diaries, etc. ), they expose their privacy to the network, providing the possibility for invaders to infringe upon their rights

    而且,由於計算機在網路社會已經浸透到人們生活的各個領域,人們出於種種目的,將自覺地(作為其他功能性信息的一寫入計算機,如網上購物時的家庭地址、電話等)或不自覺地(人們在正常利用計算機時,並未意識到自己將有的記錄留在計算機里,如個人信件、日記等)暴露在網上,為擅自闖入者留下了侵權的可能。
  3. Large quantities of writers have given up the " since long foring " state that indulge in self - admiration, it is united by marriage with the media to begin, join ranks that news scalp, masses media come satisfied material desire to expand limitlessly through publishing house and movie & tv, etc. ; some authoress reduce posture go and cater to common customs standard, but also to deep and remote and bold and wanton spy brush stroke in chinese painting and calligraphy have individual privacy, the literary world is packed with the atmosphere one share vulgar and low ; writer dullness and self - criticism spirit of imagination forget and force the literary creation to get used to simple duplicating

    一大批作家放棄了孤芳自賞的「自戀」狀態,開始與傳媒聯姻,加入了新聞炒作的行列,藉助出版社和影視等大眾傳媒來滿足無限膨脹的物質慾望;女作家不僅降低姿態去迎合世俗標準,而且筆觸往個人的探幽更為大膽放肆,文壇充斥著一股粗俗低下的風氣;作家想象力的單調和自我批判精神的遺忘迫使文學創作習慣于簡單的復制。
  4. Part ii : this part uses the typical examples of cases reportage to show that in current situation the main melody of chinese media ' s reportage is to improve interpersonal relationship and moral standards. however there are still many problems. some reports do the media trials that are beyond the normal trial procedure

    第二:概括了我國案件報道的現狀,對其進行了新聞倫理學思考:我國媒體案件報道的主旋律是懲惡揚善、伸張正義,但是也存在許多問題,諸如:案例報道失當,造成新聞傷害;報道超越審判程序,進行媒體審判;媒體炒作侵犯權;媒體無原則地遷就受眾,報道品味滑坡;報道不顧社會責任,一味追求刺激等。
  5. Based on li jing, li jun vs chongqing mail electricity college, the author analyses the legal status of college, effectiveness of school regulation, relation between privacy of students and right of knowing of college, which bring society into hot debate. author expects the necessity and feasibility of educational administration legalization would be demonstrated adequately through research on it

    筆者以李靜、李軍訴重慶郵電學院一案為平臺,從教育行政法治的視角,對由該案引發的「高校能否成為適格的行政訴訟被告」 、 「學校能不能依據校規開除學生」以及「學校知情權與學生權的關系」三大問題進行了詳盡的析與闡述,以實例論證了學校內行政管理走向法治化刻不容緩,它是實現和擴大學校辦學自主權必須跨越的一道不低的門檻
  6. Federal government agencies including medicare australia and the child support agency are also reviewing the systems they use to protect confidential information as part of a broadening crackdown on privacy breaches, the newspaper says

    該報亦稱,聯邦政府門,包括澳大利亞醫療福利和兒童援助,也都正在開展對保護絕密信息的系統進行重新檢查,以此作為這一次大力打擊違反行為行動的一
  7. The full text contains four sections. the fundamental substance is as follows : in the first section, the thesis theoretically defines the right to privacy, the right to network and the characteristics of network privacy in the light of law, analyzes the difference between the right to privacy and the right to privacy in cyberspace. the second section introduces the protection system pattern of network privacy in the u. s. a, the european free trade association and the other country in the world, then give the evaluation

    本文首先對網路權進行概括性的論述;其次對國家及地區對網路權的保護模式進行介紹和評析;再次,通過析我國網路權保護現狀及存在的問題,結合我國的實際情況,選擇適合我國國情的網路權保護模式;最後,對我國網路權的立法保護體系進行構建,並提出其他的對策及建議。
  8. Combining with theory of civil tort ' s constitutive requirements and the characteristics of protection to right of privacy in media activies, author advance four constitutive requirements : existence of act of media intrusion into right of privacy ; existance of injury ; disclosure of the interested parties ; subjective fault of tort feasor

    在該中,筆者結合民事侵權的構成要件理論,以及新聞活動中權及其保護的一些特點,提出構成新聞侵害權行為的四大構成要件,即新聞侵害權行為的存在;損害結果的出現;具體的當事人可以被指認及侵權行為人的主觀過錯。
  9. This paper is divided into seven parto in the fist part, the author introduces the history and development of privacy and the right to privacy, and thinks that the produce reasons of privacy include the development of the physical life and mankind ' s mental state need

    本文共為七,通過對權的產生和發展、權在社會生活中的地位和作用、權的理論基礎、權的法律制度以及各國權的法律制度,構想出我國權法律規范體制。第一章為權的產生和發展,探討了權的產生原因和發展過程。
  10. All along there have been great differences between the states and the european countries in the areas of policies and laws for the protection of privacy rights. comparatively speaking, eu places more emphasis on privacy right protection. as a result, a great majority of the eu member countries have enacted privacy right protection legislation

    一直以來,美、歐等地對保障權的政策及法律都有很大的歧,相對而言,歐盟較重視權的保障,因此大歐盟國家都有明文立法保障權,特別在個人資料保障法律方面,歐盟的法律遠比美國詳盡。
  11. The same country also exerts different understandings on privacy in different ages. therefore the train of author ' s thought is to analyze fundamental points on privacy right including its appearance, substance, nature character, constitutional significance, perform principle and so on

    本文嘗試從憲政的大視野中探討權的一些基本理論問題,涉及權的概念范圍、本質特徵、憲政意義、價值基礎及行使原則,以期澄清理論界對憲法權的爭議。
  12. On the other hand, in order to ensure that the us trans - national corporations would implement their personal data protection policy, the " principles " also stress the importance of remedies. as such, the " principles " provide that in most cases, the persons affected could initiate legal proceedings either in the states or europe. besides, the " principles " also list in detail the remedies that can be pursued under the laws of the states, including infringement of privacy rights under a common law tart claim etc

    另一方面,為了確保美國的跨國企業會執行保障個人資料的政策,原則也強調制裁的重要性,因此,原則規定受影響的人士在大情況下,均可以在歐盟或美國提出訴訟,原則也詳細列出了一系列根據美國法律可以追究的制裁方式,包括普通法中的侵犯權等。
  13. Part ii makes comparison between trade secret and some other relevant concepts : the relationship of the distinguishment betneen trade secret and the state secret and their mutual transformation ; the difference and simitarity between trade secret and individual privacy ; the connection and diversification between trade secret and patent right, and how to choose protection between the above stated relationship

    第二是將商業秘密同其其它相關概念進行比較。主要論述了商業秘密同國家秘密的區別和相互轉化的關系;商業秘密同個人的共同點和不同點;商業秘密同專利的聯系與區別;權利人如何在二者之中選擇保護方式等待。
  14. Housing society, hung sing restaurant, tao heung restaurant

    所在,不便詳述。
  15. 3. 4 each member represents, warrants and agrees that it has obtained all necessary third party copyright or trademark licenses and permissions and shall be solely responsible for ensuring that any material or information it posts on the site or provides to egate2china or authorizes egate2china to display does not violate the copyright, trademark, trade secret or any other personal or proprietary rights of any third party or is posted with the permission of the owner of such rights

    您授予本公司獨家的、全球通用的、永久的、免費的許可使用權利(並有權在多個曾面對該權利進行再授權) ,使本公司有權(全份地)使用、復制、修訂、改寫、發布、翻譯、發、執行和展示"您的資料"或製作其派生作品,和/或以現在已知或日後開發的任何形式、媒體或技術,將"您的資料"納入其他作品內。 7 .
  16. The motion, to be proposed by hon andrew leung kwan - yuen, says : " that, as there are from time to time complaints about serious invasion of personal privacy by some media organisations and earlier on, peep photos of a female artiste changing her clothes had been taken and published by a magazine which seriously invaded the privacy of the artiste and trampled on women s dignity, thereby causing a great public outcry ; this council urges the government to expeditiously take measures, including

    該項議案將由梁君彥議員提出,內容為:鑒于不時有投訴指傳媒機構嚴重侵犯個人,早前更有雜志偷拍及刊登女藝人的更衣照片,嚴重侵犯當事人的及踐踏女性的尊嚴,引起公眾極大不滿,本會促請政府盡快採取措施,包括:
分享友人