In data security, the transmission of data to unauthorized users by processes with legitimate access to data. A compiler, for example, could leak a proprietary program whilst it is being compiled.
In computer security, a computer program with an apparently or actually useful function that contains additional(hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security.