³ÉÈËÓ°Òô

Commentary

25 Unauthorised use of information

CONFIDENTIALITY vol 12(3)

25 Unauthorised use of information

| Commentary

Clearly, if no use is permitted, then all uses are unauthorised. Similarly, if only limited uses are permitted,

To continue reading
View the latest version of this document, as well as thousands of others like it, sign in to ³ÉÈËÓ°Òô or register for a free trial