1. Is a system in place to ID abuse of IT including improper access, tampering, or altering of business data? 系统是否对不正当操作,擅自修改或者商业数据的修改等ID滥用行为有制约?
2. Alpha translated his natural independence and lack of genetically engineered docility tampering into a regimen that emphasized individuality and creativity. 阿尔发转换他天生的独立和基因驯服改造的缺乏,成为强调个体性和创造力的支配关系。
3. Security threats including the inadvertent misplacement, theft and diversion of inventory, product tampering and possibly even illegal uses such as for terrorist acts. 安全威胁,包括疏忽大意的误放、存货的转移或行窃、产品的损害,甚至有可能非法使用,譬如恐怖行为。
英英解释
n.
1. the act of altering something secretly or improperly