When information or assets have been accessed, moved or changed without permission. Also referred to as a data spill or data leak.
Sign up for your free trial today and get hands on with all the compliance features that ISMS.online has to offer
Find out more