Statements (51)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:technology
Surveillance |
gptkbp:canAutomate |
Yes
|
gptkbp:canBeCircumventedBy |
Encryption
End-to-end encryption Anonymization Use of private email servers |
gptkbp:canBeManual |
Yes
|
gptkbp:canBeMass |
Yes
|
gptkbp:canBeTargeted |
Yes
|
gptkbp:challenge |
gptkb:judge
|
gptkbp:controversy |
Privacy concerns
Legal challenges Ethical issues |
gptkbp:detects |
gptkb:Spam
Phishing Unauthorized access Data leaks Malicious activity Policy violations |
gptkbp:example |
Detecting insider threats
Employer monitoring employee emails Filtering spam and phishing emails Government monitoring for national security |
https://www.w3.org/2000/01/rdf-schema#label |
Email Surveillance
|
gptkbp:implementedIn |
Intrusion detection systems
Data loss prevention systems Email archiving solutions Email filtering software Network monitoring tools |
gptkbp:mayInclude |
Warrants
Subpoenas |
gptkbp:regulates |
gptkb:HIPAA
gptkb:FISA gptkb:GDPR gptkb:ECPA Local laws |
gptkbp:relatedTo |
Data protection
Mass surveillance Electronic surveillance Email privacy Workplace monitoring |
gptkbp:usedBy |
Government agencies
Security services Law enforcement agencies Employers |
gptkbp:usedFor |
Monitoring email communications
|
gptkbp:violatedBy |
Confidentiality
Privacy rights |
gptkbp:bfsParent |
gptkb:Season_2,_The_Office_(U.S.)
|
gptkbp:bfsLayer |
6
|