I’m working on a computer science discussion question and need support to help me understand better.Some organizations receive confidential e-mails and take specific steps to protect and label these e-mails.Go to Basic Search: Strayer University Online Library to locate and integrate at least two quality, academic resources (in addition to your textbook) on the protection and labeling of confidential emails. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology.Please respond to the following in a post of at least 200 words:Describe the methods organizations use to protect and label confidential e-mails.
Identify and describe any laws, such as the General Data Protection Regulation (GDPR), or legal requirements, such as eDiscovery, by which organizations may be required to abide.
Provide full citations and references, formatted according to Strayer Writing Standards.For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
In 60 to 75 words, please respond to at least one other post. Choose to respond to those who have few or no responses.Note: You will find it helpful to use the information from this post and the feedback you receive on it in your assignment due this week.
Requirements: half page