-
1 theft of information
-
2 theft
крадіжка, викрадання, викрадення, розкраданняtheft control in commercial institutions — запобігання крадіжкам (викраданню) в торгівельних закладах
- theft controltheft involving the use of force — крадіжка, пов'язана із застосуванням сили (насильства)
- theft from a car
- theft from a person
- theft from a vehicle
- theft incident
- theft insurance
- theft involving contact
- theft of cultural valuables
- theft of gas
- theft of information
- theft of motor vehicle
- theft of nuclear materials
- theft of radioactive materials
- theft of relics
- theft of scientific ideas
- theft of secret information
- theft of state-owned property
- theft of transport vehicle
- theft of water
- theft offence
- theft offense
- theft risk
- theft without contact -
3 theft of secret information
English-Ukrainian law dictionary > theft of secret information
См. также в других словарях:
theft — noun ADJECTIVE ▪ petty ▪ grand (AmE) ▪ attempted (esp. BrE) ▪ the crime of attempted theft ▪ large scale, outright … Collocations dictionary
theft — n [Old English thiefth]: larceny; broadly: a criminal taking of the property or services of another without consent ◇ Theft commonly encompasses by statute a variety of forms of stealing formerly treated as distinct crimes. grand theft: theft of… … Law dictionary
Information (formal criminal charge) — Information is a formal criminal charge made without a grand jury indictment by a prosecutor in a document called an information.[1] The term is used in Canada[2] and various other common law jurisdictions, including a number of U.S. states. The… … Wikipedia
theft — [θeft] noun [countable, uncountable] the crime of stealing or an act of stealing something: • An employee was fired for theft. • Your property should be insured against theft. theft of • Thefts of property from cars rose 24%. iˈdentity ˌtheft… … Financial and business terms
Information privacy — Information privacy, or data privacy is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. Privacy concerns exist wherever personally… … Wikipedia
Information technology audit process — Information technology audit process:Generally Accepted Auditing Standards (GAAS)In 1947, the American Institute of Certified Public Accountants (AICPA) adopted GAAS to establish standards for audits. The standards cover the following three… … Wikipedia
Information diving — is the practice of recovering technical data, sometimes confidential or secret, from discarded material. In recent times, this has chiefly been from data storage elements in discarded computers, most notably recoverable data remaining on hard… … Wikipedia
Information held under Section 142 of the Education Act 2002 — (previously, but still widely referred to as, List 99) is a database maintained in the United Kingdom by the Department for Education and Skills (DfES). It contains details (such as names and dates of births) of individuals who are banned from… … Wikipedia
Theft — In criminal law, theft (also known as stealing or filching) is the illegal taking of another person s property without that person s freely given consent. As a term, it is used as shorthand for all major crimes against property, encompassing… … Wikipedia
Information sensitivity — Sensitive information is information or knowledge that might result in loss of an advantage or level of security if revealed (disclosed) to others who might have low or unknown trustability and/or indeterminable or hostile intentions.Loss, misuse … Wikipedia
Information security audit — An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple type of audits, multiple objectives for different audits, etc. Most… … Wikipedia