Value sensitive design focuses on which of the following?
Which of the following is NOT a workplace surveillance best practice?
Which of the following is considered a records management best practice?
Which of the following techniques describes the use of encryption where encryption keys are divided into parts that can then be used to recover a full encryption key?