http://www.w3.org/ns/prov#value | - Invest in secure systems; ensure your processes are sound; make sure security requirements and restrictions extend to any sub-contractors and anyone else with access to the data.It is not just companies using portable media which are at risk: operators who are online are vulnerable to attacks including hacking and denial of service attacks.
|