DQ 1: Mention some of the technologies that are used by businesses to protect their data? How many times has this scenario occurred?

DQ 1: Mention some of the technologies that are used by businesses to protect their data? How many times has this scenario occurred?

DQ 2: What do you think of e-mail observation by companies on their employee’s communication? Is this considered an invasion of an employee’s privacy?