Glossary -D - G

Exfiltration

By Mark Sharron | Updated 8 March 2024

Jump to topic

When information is transferred from an information system without consent.

complete compliance solution

Want to explore?
Start your free trial.

Sign up for your free trial today and get hands on with all the compliance features that ISMS.online has to offer

Find out more

Streamline your workflow with our new Jira integration! Learn more here.