Search results

From Open Risk Manual
  • ...utomatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. ...of RFID technologies should be facilitated by the benefits of consistent [[Data Protection]] safeguards.
    839 bytes (123 words) - 23:43, 27 September 2021
  • * Data Infrastructure === Data Infrastructure ===
    2 KB (296 words) - 13:09, 16 June 2023
  • * Data the installation became operational * The date and country of the GO issue and a unique identification number
    3 KB (450 words) - 09:49, 2 June 2023
  • * Certain certificate data fields are mandatory, others are optional * Certain data fields apply to generic EECS Certificates, others are additional for Electr
    8 KB (1,275 words) - 12:07, 6 June 2023

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)