| http://www.w3.org/ns/prov#value | - Although many instances occur after mail is stolen, or information is accessed online, sometimes private information is obtained by unscrupulous people who work for restaurants or other businesses, or even people at a level of trust in which they can access personnel or student files, McKenna said.
|