Last week we posted on the three forms of misuse of privilege, followed by a recent example of malicious abuse, where a stock trader used his IT skills to circumvent the system.