answersLogoWhite

0

data miss use is the term which is defined as "the data belongs to certain 3rd party is shared to all others with out their permission" or

It is also said as we takes away the confidential data from the others without their

permission.

example:1.the project codes of a company are shared to others so that the certain company codes are known others and they can miss use them.

2. by the process of hacking one can retrieve the confidential details of a company

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

How does a USB lock actually work?

A USB lock works by physically blocking USB ports from unauthorised access, thus preventing unauthorised data transfer, which reduces the risk of data leakage, data theft and computer viruses.


What is unauthorised transfer and copying?

Unauthorized transfer and copying refers to the act of moving or duplicating data, information, or intellectual property without proper permission or legal authority. This can include unauthorized downloading of files, sharing copyrighted material without permission, or transferring confidential information without consent. It can result in legal consequences and violations of intellectual property rights.


Is responsible for protecting the data against unauthorised access?

security management


How do you avoid data misuse?

To avoid data misuse you must be able to keep your personal information as a secret, you shouldn't tell anyone.


Do I say Staff who misuse the data will be subject to disciplinary action or Staff who misuse the data will be subjected to disciplinary action.?

Use subject.


Is not a method for copying data to another part of the worksheet?

Printing is not a method for copying data to another part of the worksheet.


What is meant by the term data leakage?

Data leakage is the unauthorized transfer of data from a computer or datacenter to the outside world. It can occur by a number of different methods including copying data, removing tapes or disks physically, or simply remembering the data and reproducing it elsewhere.


Which data will automatically update copied data?

after copying


What penalties can someone face if they are found guilty of offences against the computer misuse act?

The 3 main points are:Unauthorised access to computer material: it is unlawful without proper authority to: use anthoer person's ID and password to access a computer, use data or run a program, alter, delete, copy or move a program or data or simplay to output a program data, lay a trap to obtain a password.Unauthorised access to a computer with intent to commit or facilitate the commission or a further offence: this covers the situation where unauthorised access is gained with intent to commit a further offence, eg a person may gain unauthorised access to computer material to commit theft by re-directing funds from someone else's bank accountUnauthoried modification of computer material: this offence includes the deliberate deletion or corruption of programs or data includes the creation of viruses where these results in the modfication or destruction of data.


Which are ways to move data either by moving completely or copying into a new location?

Data can be moved by manually transferring files from one location to another, using a data transfer tool or service to automate the process, or backing up data and restoring it to a new location. Copying data can also be done by creating duplicates of files and folders in a new location, either through file management tools or backup software.


Three things that a surgery could do to make sure the data was kept safe from unauthorised people?

1. Use encryption of the data so that if an unauthorised person gets hold of it, it is more difficcult for them to understand 2. Make sure the computers which hold the data are physically secure e.g. in a locked romm when no one is using them 3. Put passwords on the computers to avoid unathorised access or 3. Do not make the data available on a network where an unauthorised person may have access


What is the process of modifying data thet doesnt allow unauthorised users from reading it?

It's called encryption.