« Back to Glossary IndexSearching through data residue in a system to gain unauthorized knowledge of sensitive data. « Back to Glossary Index