norton-security.be | Monitors communications between your computer and other computers and helps block unauthorised traffic. | webcam unauthorised, unauthorised access, computer unauthorised, unauthorised traffic | safe, available, threat, password, cyber | 2 |
sailhaus.be | To make the reuse of electronic equipment possible, all data saved by the previous user is wiped out to eliminate the risk of data being exposed to unauthorised access. In cases where our data overwrite tools cannot completely remove the data, hard drives are destroyed by mechanical crushing. | data unauthorised, unauthorised access | material, scrap, raw, waste, grade | 1 |
huntr.be | We have taken the necessary physical, technical and organisational security measures to ensure that your personal data will be effectively protected against unauthorised access, use or disclosure. | effectively unauthorised, unauthorised access | employee, interest, today, role, opportunity | 1 |
h2050.be | that you are responsible for ensuring that your password and login are kept confidential, as well as for any action carried out using your login and password. You must be prepared to contact VITO immediately, should it become apparent that your login or password is being used in an unauthorised… | password unauthorised, unauthorised manner | shall, law, amendment, catalyst, liability | 1 |
favoriete-prijs.be | We take the relevant precautions - administrative, organisational, technical and physical - to protect your personal data against loss, theft, misuse, unauthorised access, unauthorised transmission, unauthorised amendment and destruction. This means, that your data is protected by entry controls… | misuse unauthorised, unauthorised access, access unauthorised, unauthorised transmission, transmission unauthorised | declaration, address, processing, purpose, provision | 1 |
rias.be | In your project, you might store some sensitive personal or credential data in your database. Should an unauthorised person get access to your DB, all… | database unauthorised, unauthorised person | stack, developer, laravel, secondary, antwerp | 1 |
ag.be | Not everyone within AG has access to your personal data. Only people who handle your account may access and process your personal data. These people have a strict duty of confidentiality and are very aware of this. Furthermore, our specialist teams make it technically impossible for unauthorised… | impossible unauthorised, unauthorised person | strictly, preferences, purpose, setting, device | 1 |
quatuor-brussels.be | For all requests set out above, please send us an email with “data privacy request” in the subject line and include a copy of your identity card or another proof of your identity (e.g. driver’s license) to help us prevent unauthorised individuals from accessing, changing or deleting your… | license unauthorised, unauthorised individual | befimmo, floor, purpose, estate, real | 1 |
butterei-purnatur.be | We use a wide range of suitable technical and organisational measures to protect your personal data and to help prevent the theft, misuse and unauthorised access, disclosure, modification and destruction of information about you from taking place. We retain the personal data you provide on… | misuse unauthorised, unauthorised access | butter, fresh, authentic, traditionally, organic | 1 |
phyllium.be | We are committed to ensuring that your information is secure. In order to prevent unauthorised access or disclosure, we have put in place suitable physical, electronic and managerial procedures to safeguard and secure the information we collect online. | order unauthorised, unauthorised access | species, fast, egg, list, mage | 1 |
0110.be | Privacy : Since media files are not transferred it is impossible for the system running the service to make unauthorised copies of these files. There is no need to trust the service since all processing happens locally, in the browser. | service unauthorised, unauthorised copy | java, thread, file, library, fig | 1 |
we-are-health.be | …no longer imagine life without data and apps. The corona crisis has also meant that even more things are happening online, such as teleconsultation or the corona virus alert app, Coronalert. Despite the many advantages and possibilities, the suspicion of unauthorised use of data is currently high. | suspicion unauthorised, unauthorised use | citizen, health, principle, innovation, research | 1 |
sined.be | All unauthorised usage is strictly forbidden. However, please don't hesitate to hit me up on my Facebook if you wish to contact me or whatever... | | photography, quick, timeline, passionate, travel | 1 |
vcc.be | We only retain collected information for as long as necessary to provide you with your requested service. What data we store, we’ll protect within commercially acceptable means to prevent loss and theft, as well as unauthorised access, disclosure, copying, use or modification. | theft unauthorised, unauthorised access | material, dairy, slice, form, culinary | 1 |
ifbseminars.be | Personal data will not be transferred to third parties or disclosed. We will at all times respect the confidentiality of the data within our organisation. To ensure that your data is protected from, among other things, unauthorised access, unlawful use, loss or unauthorised alterations, the… | thing unauthorised, unauthorised access, loss unauthorised, unauthorised alteration | course, material, purpose, choice, health | 1 |
capitald.be | Your valuable data needs securing. Unauthorised access must be prevented even if your data is in the cloud or with your customers. | data unauthorised, unauthorised access | learn, compliance, capital, governance, centric | 1 |
metafleet.be | The web access is the fleet manager's tool to access dashboards and information for each vehicle and driver. The interface is intuitive and composed of 8 main pages allowing a complete management and vision of the fleet. | misuse unauthorised, unauthorised use, vehicle unauthorised, unauthorised start | fleet, vehicle, driver, cost | 0 |
aefmat.be | AEFMAT is part of an international network known as ATAS which was formed by the societies that are affiliated to STAT. STAT is the UK-based society which was the first professional organization of Alexander Technique teachers. AEFMAT affiliated to STAT in 1996. | technique unauthorised, unauthorised use | teacher, course, member, society, history | 0 |
wheels-up.be | Wheels Up brings quality airshow reports from Belgium and some selected European airshows featuring pictures and high definition video. | | report, airshow, aviation, picture, european | 0 |