Is this acceptable approach to determine criminal activity


Problem

A manager suspects an employee may be using an organizational computer to view and download certain illegal materials. The manager has asked the information technology manager for his advice regarding her suspicions about these materials. The IT manager states he can change the password to the user's account, and they can log in together over the weekend while the worker is out and view materials on the workstation. Is this an acceptable approach to determine whether criminal activity is occurring on the organization's computer?

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Is this acceptable approach to determine criminal activity
Reference No:- TGS03215890

Expected delivery within 24 Hours