Discussion
1. Should employers be allowed to monitor computer, Internet, email and telephone use by employees? Should employers utilize closed-circuit television (CCTV) and global positioning technologies to collect information on employees? Why?
2. How can a security and loss prevention practitioner leverage the capabilities of social media to enhance job performance in protecting people and assets?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.