機密信息 的英文怎麼說

中文拼音 [xìn]
機密信息 英文
confidential information
  • : machineengine
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  • 機密 : 1 (重要而秘密的) secret; classified; confidential; privacy 2 (機密的事)secret:泄漏機密divulge...
  1. Cryptogram programming of confidential information is an effective tool for ensuring information security

    機密信息碼化是保證安全的一種有效手段。
  2. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算網路傳輸數據日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人隱私等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的被非法竊取和修改,因而極大地限制了計算網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加措施
  3. The consultant acknowledges that, in the course of its operations, plan china has developed, gathered and generated extensive data, information, procedures, processes, methods and systems of a confidential and proprietary nature including, without limitation, information or evaluations regarding grant applications and distributions, contact persons and customers, plan china programs, research data, planning data, development data, experience data, business processes, methods, know - how and other confidential information, knowledge and data used or useful in conducting the operations of plan china and its associated companies and foundations ( together, “ confidential information ” )

    乙方承認,對接觸到的甲方的及公司和數據等工作內容均應保守秘,其中包括甲方的贈款申請及分配、所涉及的人員及客戶、甲方工作計劃、研究資料、規劃資料、發展狀況、經驗資料、工作程序、方法、訣竅以及與甲方相關的其他公司和基金組織的(亦稱「機密信息」 ) 。
  4. Party b acknowledges that, in the course of its operations, party a has developed, gathered and generated extensive data, information, procedures, processes, methods and systems of a confidential and proprietary nature including, without limitation, information or evaluations regarding grant applications and distributions, contact persons and customers, party a programs, research data, planning data, development data, experience data, business processes, methods, know - how and other confidential information, knowledge and data used or useful in conducting the operations of party a and its associated companies and foundations ( together, “ confidential information ” )

    乙方承認,對接觸到的甲方的及公司和數據等工作內容均應保守秘,其中包括甲方的贈款申請及分配、所涉及的人員及客戶、甲方工作計劃、研究資料、規劃資料、發展狀況、經驗資料、工作程序、方法、訣竅以及與甲方相關的其他公司和基金組織的(亦稱「機密信息」 ) 。
  5. Agency spokesman paul gimigliano said an officer had been fired for having unauthorized contacts with the media and disclosing classified information to reporters, including details about intelligence operations

    該局發言人保羅?季米格里安諾說,一名工作人員? ?因未經授權而與媒體聯系並將包括情報工作的具體細節在內的機密信息泄露給記者? ?已被解僱。
  6. Party b acknowledges that all confidential information is the sole property of party a, that strict protection of the confidential information is necessary to the successful continuation of the operations of party a and its associated companies and foundations, and that unauthorized use or disclosure of the confidential information would irreparably harm party a and its associated companies and foundations

    乙方承認,所有機密信息都是甲方的獨有財產,嚴格保守是甲方和與其有關的公司和基金組織成功運作的保證,未經授權使用或泄露會對甲方及其有關公司和基金組織造成無可挽回的傷害。
  7. The consultant acknowledges that all confidential information is the sole property of plan china, that strict protection of the confidential information is necessary to the successful continuation of the operations of plan china and its associated companies and foundations, and that unauthorized use or disclosure of the confidential information would irreparably harm plan china and its associated companies and foundations

    乙方承認,所有機密信息都是甲方的獨有財產,嚴格保守是甲方和與其有關的公司和基金組織成功運作的保證,未經授權使用或泄露會對甲方及其有關公司和基金組織造成無可挽回的傷害。
  8. Any information which is by nature confidential ( for example, because its disclosure would be of significant competitive advantage to a competitor or because its disclosure would have a significantly adverse effect upon a person supplying the information or upon a person from whom the supplier acquired the information ), or which is provided on a confidential basis by parties to an investigation shall, upon good cause shown, be treated a such by the authorities

    任何原屬性質的(例如,由於的披露會給予一競爭者巨大的競爭優勢,或由於的披露會給披露者或給向獲得者提供的人士帶來嚴重不利影響) ,或由調查參加方在保基礎上提供的,主管關應在對方說明正當原因后,按機密信息處理。
  9. Talks between the united states and the european union on sharing confidential airline pa enger information have broken down

    美國和歐盟之間關于分享民航乘客機密信息的談判破產了。
  10. Talks between the united states and the european union on sharing confidential airline passenger information have broken down

    美國和歐盟之間關于分享民航乘客機密信息的談判破產了。
  11. It takes use of pseudo - random technology, dynamic adaptive technology, multi - channel technology, random position embed technology and so no. so the digital watermarking can resist the physical process of printing and scanning. at the same time, the watermark is binary image which includes a great deal of information, such as personal id, secret information, even a piece of map

    本文特別針對印刷和掃描給數字圖像帶來的誤差的問題,設計了一種新的水印演算法,綜合運用了偽隨處理技術、動態自適應技術、不同應用選擇不用頻帶處理技術、隨位置嵌入技術、多通道嵌入等技術,使得本文所設計的水印演算法能夠抵抗印刷和掃描的物理轉換過程,同時本文所設計的水印是二值圖像,能夠承載大量的,例如個人id 、機密信息、商標標識,甚至可以是一幅地圖。
  12. Each party shall provide the same care to avoid disclosure or unauthorized use of the other party ' s confidential information as it provides to protect its own similar proprietary information

    各方應謹慎從事,以防披露或擅自使用另一方的機密信息,有如各方保護自己的類似專有
  13. The type of threat i ' m talking about is one against your digital assets ; this can be anything from a hacker claiming that they have already stolen confidential information, to a former employee alleging that a trojan horse is already in your environment and could be triggered at any time

    我正在談的的威脅類型依靠你的數字資產;這可能是聲稱已經偷了機密信息的黑客,以前的職工聲稱一個特洛伊木馬已經存在於你的環境中,並能在任何時候觸發。
  14. Each party also agrees that no representation or warranties whatsoever, express or implied, as to the accuracy or completeness of the confidential information are made in connection with the confidential information

    各方還一致同意:對于與此機密信息相關的準確性或完整性,不得做出任何陳述或保證,無論其為明示或默示。
  15. The law of protection of confidential information effectively allows a perpetual monopoly in secret information - it does not expire as would a patent or trade mark

    保護機密信息的法律有效的容許無限期的獨自擁有秘,而不象專利及商標那樣有期限限制。
  16. As to transparency issue, canada believes the best measure is to make special arrangements for business confidential information at the first step

    對于透明度問題,加拿大認為最好事先就商業機密信息作出特殊安排。
  17. Phishing : a type of technology - based social engineering ploy in which computers users are directed, usually via e - mail, to a web site that purports to be that of a bank, loan company, credit card company, e - commerce merchant, governmental agency, or other site that requires users to enter confidential information, such as account passwords, account numbers, social security numbers, and other personal data that is collected and used for identity theft

    網路釣魚:基於社會工程學的技術,通常通過電子郵件,據稱是銀行,貸款公司,用卡公司,電子商務商,政府代理的網站,或其他要求用戶輸入機密信息的站點,諸如帳戶碼、帳戶號、社會保險號的機密信息被收集並用於身份偷竊。
  18. In the course of implementing this agreement, all the oral and written information, including but not limited to manufacturing technologies, procedures, methods, formulas, data, techniques, experiences, know - how, and business information ( " confidential information " ), to be provided by party a to party b shall be treated as strictly confidential and shall be used only for the purpose set forth herein

    在履行本協議的過程中,甲方向乙方提供的一切口頭和書面,包括但不限於製造工藝、程序、方法、配方、數據、技術、經驗、訣竅和商業( 「機密信息」 ) ,均應以絕件對待,且只能用於本協議規定的目的。
  19. Bar code was introduced into this schema as secret image to reduce the complexity and difficulty of the server ' s auto - recognition of secret information which was hidden in images, so that made the schema more efficient

    方案中為認證服務器引入了條形碼圖像作為圖像,有效地降低了服務器對圖像中機密信息自動識別的難度和復雜度,使得方案更加有效、實用。
  20. The secret information derived from the key exchange data

    鑰交換數據導出的機密信息
分享友人