适时地,这项罪名成为1998年数据保护法中的第55条。这使得不正当地获取个人信息非法,但这项罪名可以以公众利益作为抗辩理由。
In due course this new offence became section 55 of the 1998 Data Protection Act which makes it illegal to unlawfully obtain personal information and it carries a public interest defence.
合法研究和不正当手段获取数据之间的界线是很模糊的。
The line between legitimate research and ill-gotten information is fuzzy.
入侵探测系统(IDSes)等现有的安全解决方案不了解探测不正当活动所需的数据库协议和结构。
Existing security solutions, such as intrusion detection systems (IDSes), lack the knowledge of database protocols and structures required to detect inappropriate activities.
进入计算机系统进行监测,以确定不正当访问,篡改或改变由内部员工的业务数据。
Access to computer systems should be monitored to identify the improper access, tampering or altering business data by internal employees.
进入计算机系统进行监测,以确定不正当访问,篡改或改变由内部员工的业务数据。
Access to computer systems should be monitored to identify the improper access, tampering or altering business data by internal employees.
应用推荐