Individuals who have experienced a situation in which their personal computer, cell phone, laptop or other telecommunications device has been hacked or otherwise accessed and sensitive, protected or confidential data has been copied, transmitted, viewed, stolen or used by an individual not authorized to do so.
No programs.