Example sentences of "[n mass] hold " in BNC.

  Next page
No Sentence
1 THE TRANSPORT Secretary was attacked yesterday for failing to bring in screening of passenger baggage to be stored in aircraft holds , and for putting commercial interests ahead of tighter security .
2 Although infants do not have their own baggage allowance , a collapsible pushchair may be carried in the aircraft hold free of charge .
3 It also covers data held manually which can be identified using a code held on a computer .
4 In particular , BGS is seeking permission from commercial companies to publish an index of data held , though ownership will still reside with the original company .
5 The additions bump up the mandatory and discretionary access controls , give each piece of data held a security level label and implement the sophisticated system auditing capabilities that the certification requires .
6 The additions bump up the mandatory and discretionary access controls , give each piece of data held a security level label and implement the sophisticated system auditing capabilities that the certification requires .
7 The split , which will be effected by issuing one share of Control Data Systems for every four Control Data held , is contingent on the agreement of Control Data 's bankers .
8 The Attorney-General referred to the Court of Appeal under section 36 of the Criminal Justice Act 1972 the question whether , in order for a person to commit an offence under section 1(1) of the Act of 1990 the computer which the person caused to perform any function with the required intent had to be a different computer from the one into which he intended to secure unauthorised access to any program or data held therein .
9 ‘ The point of law referred for consideration by the court is : in order for a person to commit an offence under section 1(1) of the Computer Misuse Act 1990 does the computer which the person causes to perform any function with the required intent have to be a different computer to the one into which he intends to secure unauthorised access to any program or data held there ?
10 ‘ In order for a person to commit an offence under section 1(1) of the Computer Misuse Act 1990 does the computer which the person causes to perform any function with the required intent have to be a different computer from the one into which he intends to secure unauthorised access to any program or data held therein ?
11 The method of meeting the key issues , the level of data held , and links with other areas of database are discussed by Andrew Brown and Keith Brain .
12 seems to have got most of his information about Sarah from the data held at her local Family Health Services Authority in Bristol , registered under the data protection act , it holds a large amount of information on patients within its area including the name and address of a patient 's doctor .
13 Second phase would be to capture Chris ' data held on about 20,000 cards , and integrate this with Aljos Farjon 's data already held on disk .
14 It also implies that data users need to continually monitor/audit the data held , to assess changes in relevance etc. , a complex and time-consuming process for modern databases , unless accounted for when designing the system .
15 The Archive will not necessarily acquire all of the identified data files — a specialist archive may comprise a small number of key datasets together with a catalogue of data held elsewhere ( meta-data ) .
16 All the countries mentioned above continue to hold censuses to check against deterioration in quality of data held .
17 Sales and profit growth ( up by 17% and 34% respectively ) remain perfectly respectable on a second and more detailed viewing — indeed , the increase in sales was commendable in a very tough year for trade publishers — even if the operating margin of 6.8% and pretax margin of 1.9% were well below the promise of 10% held out when the company was launched in the optimistic mid-80s .
18 This means that every £1 held by the bank in cash is capable of supporting total deposits of £10 .
19 The company is also said to have been the beneficial owner of £346,800 held by solicitors in London .
20 This Act aims to make public and thereby to control the use of personal data held on all types of computerised equipment .
21 This data can quickly be transferred from one information system to another and can be combined and transformed in ways which might not otherwise be practicable ; furthermore , data held on computers is invisible and not directly intelligible so that people have more difficulty in knowing what is in the records or what is happening to them .
22 The third principle is that ‘ personal data held for any purpose or purposes shall not be used or disclosed in any manner incompatible with that purpose or purposes ’ .
23 The fourth principle is that ‘ personal data held for any purpose or purposes shall be adequate , relevant and not excessive in relation to that purpose or those purposes ’ — and there is more to this than at first meets the eye .
24 The sixth principle , that ‘ personal data held for any purpose or purposes shall not be kept longer than is necessary for that purpose or those purposes ’ , follows from its predecessors and places a heavy responsibility on data users to ensure that they regularly weed out data once it has served its purpose .
25 ‘ An individual shall be entitled ( a ) at reasonable intervals and without undue delay or expense ( i ) to be informed by any data user whether he holds personal data of which that individual is subject , and ( ii ) to access to any such data held by a data user ; and ( b ) where appropriate to have such data corrected or erased . ’
26 S 1(1) provides that ‘ a person is guilty of an offence if — ( a ) he causes a computer to perform any function to secure access to any program or data held in any computer ; ( b ) the access he intends to secure is unauthorised ; and ( c ) he knows at the time when he causes the computer to perform the function that that is the case ’ .
27 The relevant words are ‘ he causes a computer to perform any function with intent to secure access to any program or data held in any computer ’ .
28 Therefore s 1(1) was contravened when , as happened in the present case , a person caused a computer to perform a function with intent to secure unauthorised access to any program or data held in the same computer .
29 BGS receives many requests for site-specific information and for access to reference collections or data held in the archives .
30 The complete archive is being reorganised to allow improved access to the data held and a quicker response time to enquiries .
  Next page