List - I | List - II |
(a) Compromises intellectual Property | (i) Confiscation of equipment or information |
(b) Deliberate acts of theft | (ii) Unauthorized access to data |
(c) Deliberate acts of information extortion | (iii) Piracy |
(d) Deliberate acts of espionage or trespass | (iv) Blackmail of information disclosure. |
Your suggestions are important to improve this site