Any access or use of a computer system, network or resource which is in violation of the company security policy or when the person or user was not explicitly granted authorization to access or use the resource or system
« Back to Glossary Index
« Back to Glossary Index
Comments are closed.