Spying on E-Mail Technology advances now allow individuals to monitor computers to which they do not even have physical access. New types of software can capture an individual's incoming and outgoing e-mail and then immediately forward that e-mail to another person.
For example, if you are at work and your child is home from school and she receives an e-mail from John at 3:00 pm, at 3:01 pm you will receive a copy of that e-mail sent to your e-mail address.
A few minutes later, if she replies to John's e-mail, within seconds you will again receive a copy of what she sent to John.
Describe two scenarios (other than the above) for the use of this type of software: (1) where the use would be ethical, (2) where the use would be unethical.