(Adding categories) |
No edit summary |
||
Line 1: | Line 1: | ||
A '''security incident''' is |
A '''security incident''' is |
||
− | {{Quote|the attempted or successful [[unauthorized access]], [[unauthorized use|use]], [[Unauthorized disclosure|disclosure]], [[unauthorized modification|modification]], or [[unauthorized destruction|destruction]] of [[information]] or [[interference]] with [[system]] operations in an [[information system]]. |
+ | {{Quote|the attempted or successful [[unauthorized access]], [[unauthorized use|use]], [[Unauthorized disclosure|disclosure]], [[unauthorized modification|modification]], or [[unauthorized destruction|destruction]] of [[information]] or [[interference]] with [[system]] operations in an [[information system]].<ref>45 C.F.R. §164.304.</ref>}} |
+ | |||
+ | == References == |
||
+ | <references /> |
||
== See also == |
== See also == |
Revision as of 23:22, 28 March 2013
A security incident is
“ | the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.[1] | ” |
References
- ↑ 45 C.F.R. §164.304.