answersLogoWhite

0

The monitoring of emails can prevent the spread of viruses and even possible terrorist activity. Nothing done online ever goes away. Emails are archived by the providers and can be accessed even years after being deleted.

Parents can monitor their children's emails by using some family email systems or programs. This can definitely ensure a child's safety, but can overstep boundries between parents and their children.

User Avatar

Wiki User

14y ago

What else can I help you with?

Continue Learning about Communications

Positive effects of modern technology?

Modern technology has comewitha host of pros and cons. It b


What are the pros and cons to using a signal booster?

One of the pros of a signal booster is it is a great product for to amplify the signal to your internet access. The cons are to install and make sure your antenna works correctly a professional installation is needed. Amazon carries a great selection, great service and shipping.


What are the pros and cons of using Information and communication technology?

Pro: One can pay bills online easily, and check bank details, plus bank online. Cons: Personal details can be hacked into and security compromised.


What are the pros and cons of spam mail?

Pros of spam mail include its potential for providing unsolicited information or offers that might appeal to certain users, as well as serving as a low-cost marketing tool for businesses. However, the cons far outweigh the pros: spam can clutter inboxes, waste time, and pose security risks through phishing scams or malware. Additionally, it can lead to decreased productivity and user frustration. Overall, while spam mail may have some benefits, its negative impact on communication and security is significant.


What are the implication on an organization providing email facilities to employees in terms of security and virus protection?

Providing email facilities to employees can expose an organization to various security risks, including phishing attacks, malware infections, and data breaches. Without robust security measures, malicious actors may exploit email systems to gain unauthorized access to sensitive information. Organizations must implement comprehensive virus protection, encryption, and employee training to mitigate these risks and ensure secure communication. Additionally, regular updates and monitoring of email systems are crucial to safeguard against evolving threats.