In computer terms, this is when a person intentionally sets out to corrupt or delete electronic files, data or software programs. This could be done on the spot, with the person having direct access to the system, or it could be done remotely through a virus or worm.