« Back to Glossary IndexSearching through data residue in a system to gain unauthorized knowledge of sensitive data.