Respuesta :

I believe the answer is User impersonation.
In general, impersonation is used to meet the security requirements of  certain client/server applications. But if the process is done under unauthorized malware/virus, the process could potentially leak the user's information onto another party

This could be what is called as a power of attorney. This is document gives a person or entity the authority to obtain information on your behalf or perform certain actions. This is usually used by individuals that are incapacitated or not present.

ACCESS MORE
EDU ACCESS