http://www.w3.org/ns/prov#value | - Someone logging on under your name has access not only to your computer files, but may also have access to your personal information (e.g. financial info, social insurance number, bank information, and any other sensitive information) and may impersonate you to send malicious e-mails.
|