The IT Law Wiki
(Adding categories)
mNo edit summary
Tag: sourceedit
 
Line 1: Line 1:
 
== Definition ==
 
== Definition ==
   
'''Information diving''' is the practice of recovering [[technical data]], sometimes [[confidential]] or [[trade secret|secret]], from discarded material. In recent times, this has chiefly been from [[data storage]] elements in discarded [[computer]]s, most notably [[recoverable data]] remaining on [[hard drive]]s. Those in charge of discarding [[computer]]s usually neglect to [[erase]] the [[hard drive]]. It is often in such circumstances for an information diver to [[copy]] [[install]]ed [[software]] (e.g., [[word processor]]s, [[operating system]]s, [[computer game]]s, etc). Other [[data]] may also be available, such as credit card information that was [[store]]d on the machine.
+
'''Information diving''' is the practice of recovering [[technical data]], sometimes [[confidential]] or [[trade secret|secret]], from discarded material. In recent times, this has chiefly been from [[data storage]] elements in discarded [[computer]]s, most notably [[recoverable data]] remaining on [[hard drive]]s. Those in charge of discarding [[computer]]s usually neglect to [[erase]] the [[hard drive]]. It is often in such circumstances for an information diver to [[copy]] [[install]]ed [[software]] (e.g., [[word processor]]s, [[operating system]]s, [[computer game]]s, etc). Other [[data]] may also be available, such as [[credit card]] [[information]] that was [[store]]d on the machine.
   
 
== See also ==
 
== See also ==

Latest revision as of 06:50, 22 April 2016

Definition[]

Information diving is the practice of recovering technical data, sometimes confidential or secret, from discarded material. In recent times, this has chiefly been from data storage elements in discarded computers, most notably recoverable data remaining on hard drives. Those in charge of discarding computers usually neglect to erase the hard drive. It is often in such circumstances for an information diver to copy installed software (e.g., word processors, operating systems, computer games, etc). Other data may also be available, such as credit card information that was stored on the machine.

See also[]


This page uses Creative Commons Licensed content from Wikipedia (view authors). Smallwikipedialogo.png