answersLogoWhite

0

It depends on their motive. They can accidentally gain unauthorized access to such information by accidetally exploiting a bug (surprisingly, this is very common) and not even know it. Or they could accidentally have access and know it, but leave it alone. Or they could be malicious and destroy or corrupt the data.

User Avatar

Wiki User

10y ago

What else can I help you with?

Related Questions

What occurrs when persons other than authorized users gain access or potential access to information other than authorized purpose?

(b) intentional disclosure


How many types of all purpose flags are authorized?

2 All purpose flags are authorized. -The All-Weather (Storm) Flag -"All-Purpose" Flag


Legal for the purpose of voucher certification means what?

funds are for the intent authorized


Can other people get your tax return info?

Not without your signed authorization for that purpose. The below information comes from is available at the IRS gov web site. Use the search box for Publication 1 or you can click on the below related link. The IRS will not disclose to anyone the information you give us, except as authorized by law. You have the right to know why we are asking you for information, how we will use it, and what happens if you do not provide requested information.


When does generating occurs when information is taken from an authorized classification guidance source and is reworded in a new or different document.?

Generation occurs when information is paraphrased or rewritten from an authorized classification guidance source into a new or different document. This process allows the information to be presented in a way that suits the context or purpose of the new document while still being based on the original guidance.


What is the purpose of the SIPRNet?

The purpose of the SIPRNet (Secret Internet Protocol Router Network) is to provide secure communication and information exchange for classified and sensitive information among authorized individuals, organizations, and government agencies. It is used by the U.S. Department of Defense and other authorized users to ensure the confidentiality, integrity, and availability of classified data.


A PII breach is an actual or possible loss of control unauthorized accessof personal information where blank users gain access or potential access to such information for an other than blank purpose w?

(a) = Unauthorized (b) = Authorized


What is the purpose of online backup?

The purpose of an online backup is when someone tries to hack into your computer and destroy your memory. What happens is when you have one on back it would automatically save your information.


A patient authorization for disclosure of PHI must include the purpose of the disclosure and what information is to release if PHI relates?

A patient authorization for disclosure of PHI should include the purpose of the disclosure, what information is to be released, who is authorized to receive the information, and the expiration date of the authorization. If the PHI relates to specific sensitive information such as mental health or substance abuse treatment, additional specific language may be required to comply with regulations such as HIPAA.


What is the purpose of the Chronicle of Higher Education?

The purpose of the publication the Chronicle of Higher Education is to provide information about all kinds of educational institutions to educators, administrators and all other interested persons. The Chronicle also has an extensive and detailed job board.


What is The minimum necessary standard for HIPPA is?

An organization should limit the use or disclosure of PHI to the minimum necessary to accomplish the intended purpose. Get a complete insight into minimum necessary standard by going through our eLearning modules on different HIPAA topics with HIPAAInstitute.com.


What is the purpose of an information sheet?

The purpose of an information sheet is to succinctly provide information on a particular topic.