A company needs to implement Data Owner Exception so that incidents are avoided when employees send or receive their own personal information. What detection method should the company use? A. Indexed Document Matching (IDM) B. Vector Machine Learning (VML) C.…