Once data is collected, it is never destroyed.
(See also Law of Unintended Data Usage.)
From Mary Ann Davidson's article Leading by example: the case for IT security in academia in Educause Review, 40(1), Jan-Feb 2005, pp. 14-23.
Return to the main menu.