System violators must be subjected to appropriate disciplinary actions for abuse of its IT system to include improper access, tampering or the altering of business data?
System violators must be
subjected to appropriate disciplinary actions
improper access
ampering or the altering of business data