Statements (51)
| Predicate | Object | 
|---|---|
| gptkbp:instanceOf | gptkb:Surveillance gptkb:technology | 
| gptkbp:canAutomate | Yes | 
| gptkbp:canBeCircumventedBy | Encryption End-to-end encryption Anonymization Use of private email servers | 
| gptkbp:canBeManual | Yes | 
| gptkbp:canBeMass | Yes | 
| gptkbp:canBeTargeted | Yes | 
| gptkbp:challenge | gptkb:judge | 
| gptkbp:controversy | Privacy concerns Legal challenges Ethical issues | 
| gptkbp:detects | gptkb:Spam Phishing Unauthorized access Data leaks Malicious activity Policy violations | 
| gptkbp:example | Detecting insider threats Employer monitoring employee emails Filtering spam and phishing emails Government monitoring for national security | 
| gptkbp:implementedIn | Intrusion detection systems Data loss prevention systems Email archiving solutions Email filtering software Network monitoring tools | 
| gptkbp:mayInclude | Warrants Subpoenas | 
| gptkbp:regulates | gptkb:HIPAA gptkb:FISA gptkb:GDPR gptkb:ECPA Local laws | 
| gptkbp:relatedTo | Data protection Mass surveillance Electronic surveillance Email privacy Workplace monitoring | 
| gptkbp:usedBy | Government agencies Security services Law enforcement agencies Employers | 
| gptkbp:usedFor | Monitoring email communications | 
| gptkbp:violatedBy | Confidentiality Privacy rights | 
| gptkbp:bfsParent | gptkb:Season_2,_The_Office_(U.S.) | 
| gptkbp:bfsLayer | 7 | 
| https://www.w3.org/2000/01/rdf-schema#label | Email Surveillance |