When using network monitoring software that captures network traffic, we are accessing information which may be sensitive in nature. What are the implications of storing this data?
No comments:
Post a Comment