Illicit access will be typified in the event that a person accesses a computer system, however without authorization and could even exceed generating the security measures are violated. It is to be noticed, after reading the referred article, does not require your configuration to subtract or delete information.
It has the following characteristics:
*The active subject is the one who accesses the computer system.
*The taxpayer is the owner of this system, who can be a natural person or legal.
*The behavior committed by the agent is fraudulent since he has had the will to access the computer system, without having an authorization or has exceeded of what he has.
It has the following characteristics:
*The active subject is the one who accesses the computer system.
*The taxpayer is the owner of this system, who can be a natural person or legal.
*The behavior committed by the agent is fraudulent since he has had the will to access the computer system, without having an authorization or has exceeded of what he has.
Comentarios
Publicar un comentario