How to avoid spying on e-mail technology


Discuss the below:

Spying on E-Mail Technology advances now allow individuals to monitor computers to which they do not even have physical access. New types of software can capture an individual's incoming and outgoing e-mail and then immediately forward that e-mail to another person. For example, if you are at work and your child is home from school and she receives an e-mail from John at 3:00 pm, at 3:01 pm you will receive a copy of that e-mail sent to your e-mail address. A few minutes later, if she replies to John's e-mail, within seconds you will again receive a copy of what she sent to John. Describe two scenarios (other than the above) for the use of this type of software:

(1) where the use would be ethical,

(2) where the use would be unethical.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: How to avoid spying on e-mail technology
Reference No:- TGS02035760

Expected delivery within 24 Hours