Mark works as a security manager for SofTech Inc. He is using a technique for monitoring what the employees are doing with corporate resources. Which of the following techniques is being used by Mark to gather evidence of an ongoing computer crime if a member of the staff is e-mailing company's secrets to an opponent?
Eloisa
4 months agoGaynell
4 months agoNettie
4 months agoLorean
4 months agoGladys
5 months agoLorrine
5 months agoAlline
5 months agoDonte
5 months agoSalome
5 months agoMireya
5 months agoKaycee
5 months agoNichelle
5 months ago