A company needs to implement Data Owner Exception so that incidents are avoided when employees send or receive their own personal information. Which underlying technology should the company use?
A. Vector Machine Learning (VML)
B. Described Content Matching (DCM)
C. Indexed Document Matching (IDM)
D. Exact Data Matching (EDM)