Data Leakage Terminology You do not have access to this note. Post navigationPrevious post: Identity and Access Management (IAM)Next post: Data Leakage Terminology