answersLogoWhite

0


Best Answer

data miss use is the term which is defined as "the data belongs to certain 3rd party is shared to all others with out their permission" or

It is also said as we takes away the confidential data from the others without their

permission.

example:1.the project codes of a company are shared to others so that the certain company codes are known others and they can miss use them.

2. by the process of hacking one can retrieve the confidential details of a company

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is Data misuse and unauthorised transfer or copying?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

How does a USB lock actually work?

A USB lock works by physically blocking USB ports from unauthorised access, thus preventing unauthorised data transfer, which reduces the risk of data leakage, data theft and computer viruses.


Is responsible for protecting the data against unauthorised access?

security management


Do I say Staff who misuse the data will be subject to disciplinary action or Staff who misuse the data will be subjected to disciplinary action.?

Use subject.


How do you avoid data misuse?

To avoid data misuse you must be able to keep your personal information as a secret, you shouldn't tell anyone.


What is meant by the term data leakage?

Data leakage is the unauthorized transfer of data from a computer or datacenter to the outside world. It can occur by a number of different methods including copying data, removing tapes or disks physically, or simply remembering the data and reproducing it elsewhere.


Is not a method for copying data to another part of the worksheet?

Printing is not a method for copying data to another part of the worksheet.


Which data will automatically update copied data?

after copying


What penalties can someone face if they are found guilty of offences against the computer misuse act?

The 3 main points are:Unauthorised access to computer material: it is unlawful without proper authority to: use anthoer person's ID and password to access a computer, use data or run a program, alter, delete, copy or move a program or data or simplay to output a program data, lay a trap to obtain a password.Unauthorised access to a computer with intent to commit or facilitate the commission or a further offence: this covers the situation where unauthorised access is gained with intent to commit a further offence, eg a person may gain unauthorised access to computer material to commit theft by re-directing funds from someone else's bank accountUnauthoried modification of computer material: this offence includes the deliberate deletion or corruption of programs or data includes the creation of viruses where these results in the modfication or destruction of data.


Three things that a surgery could do to make sure the data was kept safe from unauthorised people?

1. Use encryption of the data so that if an unauthorised person gets hold of it, it is more difficcult for them to understand 2. Make sure the computers which hold the data are physically secure e.g. in a locked romm when no one is using them 3. Put passwords on the computers to avoid unathorised access or 3. Do not make the data available on a network where an unauthorised person may have access


What type of data transfer is carried out using a USB port?

The type of data transfer that is carried out using a USB port are varied. Some of the types of data transfer include bulk data transfer, isochronous data transfer and interrupt data transfer among others.


The diffrance between ripping a DVD or burning it?

Ripping a DVD: Copying data from a DVD toanother locationBurning a DVD: Copying data to a DVD fromanother location


What is the process of modifying data thet doesnt allow unauthorised users from reading it?

It's called encryption.