T 5.72 Abuse of groupware

The abuse of groupware systems may start at different points, with the users, in the internal network, with one of the transmitting groupware or email servers, or with the recipient of messages.

If access to the groupware applications for users or to the groupware system of an organisation is protected insufficiently, an unauthorised person may gain unauthorised access to perform manipulations. In this case, an unauthorised person may cause damage, in addition to the transmission cost, by pretending to be an authorised person .

Likewise, it must be prevented that information can be read by unauthorised persons in closed groupware systems. Confidential information may be disclosed, lose its value, or may be used to the disadvantage of the recipient this way.

Examples: