a aj ji hfjizbhig jiad jv hD jug vhi SDhvb hbnsdubghi
a biabihb hsjgbidbihdgbhibsrhkgbhibshibvghibsdgjo
asbihdg hibsihbghibdshibghbshbg9bhisdbghivbhbhir
aa sbuogjanjfjnbsujoenngobuewwwwwwwwwwwwwwwwwwwwwwww0o
Answer:
(1) Protecting the privacy of personal data and proprietary information
(2) Proprietary Information
These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon
(1) Disaster Recovery Policy
(2) Acceptable Use Policy
(3) Business Continuity plan
Answer:
(d) all of the above
Explanation:
This is because, not only is digital video a core technology for digital television, it also happens to be a core technology for video conferencing and video messaging. This could be seen in its application in messaging apps for private discussion of for holding official meetings between employees in virtual conference.