### C.4.15 TH-USED: Access to data via acquisition of used product
### C.4.15 TH-USED: Access to data via access to used product
Attacker may get unauthorized access to confidential data stored on the product through acquisition of a device containing the used product.
Attacker may get unauthorized access to confidential data stored on the product through access to or acquisition of a device containing the used product.