T 5.81 Unauthorized use of a cryptomodule

If a third party manages to use an encryption module in an unauthorised manner, different kinds of damage may be the result. Examples of such damage include the following:

Example: