Once data is collected for one purpose, the temptation to use it for another purpose is too great to resist.
(See also Law of Conservation of Data.)
From Mary Ann Davidson's article Leading by example: the case for IT security in academia in Educause Review, 40(1), Jan-Feb 2005, pp. 14-23.
Return to the main menu.