Describe the methods organizations use to protect e-mails


Discussion Post: Confidential E-Mails

Some organizations receive confidential e-mails and take specific steps to protect and label these e-mails.

Locate and integrate at least two quality, academic resources (in addition to your textbook) on the protection and labeling of confidential emails. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology.

Respond to the following in a post of at least 200 words:

1) Describe the methods organizations use to protect and label confidential e-mails.

2) Identify and describe any laws, such as the General Data Protection Regulation (GDPR), or legal requirements, such as eDiscovery, by which organizations may be required to abide.

The response must include a reference list. One-inch margins, double-space, Using Times New Roman 12 pnt font and APA style of writing and citations.

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: Describe the methods organizations use to protect e-mails
Reference No:- TGS03210971

Expected delivery within 24 Hours