Respuesta :

I believe the answer is User impersonation.
In general, impersonation is used to meet the security requirements of  certain client/server applications. But if the process is done under unauthorized malware/virus, the process could potentially leak the user's information onto another party

This could be what is called as a power of attorney. This is document gives a person or entity the authority to obtain information on your behalf or perform certain actions. This is usually used by individuals that are incapacitated or not present.