Internal attacks. These attacks involve both deliberate and accidental actions by users and the introduction of infected devices or storage into the school’s system, e.g. USB flash drives.
Appears in 2 contracts
Sources: Technology Acceptable Use Agreement, Technology Acceptable Use Agreement