The IT Law Wiki
Edit Page
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 11: Line 11:
 
{{Quote|[the e]ffect of or deteriorating resulting from an act of aggression or [[attack]] whose impact may be: tangible (physical or material alteration, logic malfunction, disorganization of procedures, etc.); [[logical]] (non-availability, loss of [[integrity]], [[breach of confidentiality]]); strategic (in particular as concerns finance, additional costs for [[hosting]], transportation, [[telecommunications]], expertise, purchase/rental of [[hardware]] and [[software]], personnel, [[outsourcing]], operating losses ([[profit]] margin, [[cash flow]], customer losses), loss of funds or goods, etc.).<ref>[[Cybersecurity Guide for Developing Countries]], at 104.</ref>}}
 
{{Quote|[the e]ffect of or deteriorating resulting from an act of aggression or [[attack]] whose impact may be: tangible (physical or material alteration, logic malfunction, disorganization of procedures, etc.); [[logical]] (non-availability, loss of [[integrity]], [[breach of confidentiality]]); strategic (in particular as concerns finance, additional costs for [[hosting]], transportation, [[telecommunications]], expertise, purchase/rental of [[hardware]] and [[software]], personnel, [[outsourcing]], operating losses ([[profit]] margin, [[cash flow]], customer losses), loss of funds or goods, etc.).<ref>[[Cybersecurity Guide for Developing Countries]], at 104.</ref>}}
   
βˆ’
{{Quote|[a] loss of control, [[compromise]], [[unauthorized disclosure]], unauthorized acquisition, [[unauthorized access]], or any similar term referring to situations where persons other than [[authorized user]]s and for an other than authorized purpose have [[access]] or potential [[access]] to [[PII]], whether [[physical access|physical]] or [[electronic access| electronic]].<ref>[[DoDD 5400.11]], at 15-16.</ref>}}
+
{{Quote|[a] loss of control, [[compromise]], [[unauthorized disclosure], unauthorized acquisition, [[unauthorized access]], or any similar term referring to situations where persons other than [[authorized user]]s and for an other than authorized purpose have [[access]] or potential [[access]] to [[PII]], whether [[physical access|physical]] or [[electronic access| electronic]].<ref>[[DoDD 5400.11]], at 15-16.</ref>}}
   
 
=== HITECH Act ===
 
=== HITECH Act ===
Please note that all contributions to the The IT Law Wiki are considered to be released under the CC-BY-SA
Cancel Editing help (opens in new window)

Template used on this page: