Futuretek vends high-tech computer remnants and software to smartphone manufacturers worldwide. Futuretek maintains two software databases: one containing Futuretek's customer roll after a while nonpublic contiguity counsel for key personnel, and the other containing customer purchasing trends. The counsel in the two databases is conducive for employees to apprehension and use in intercourse after a while their job duties.
Dana is a computer programmer for Futuretek. Dana plans to run her own troop one day and pur-pose and vend her own computer remnants to smartphone companies. As an employee, she has approximation to the two databases containing Futuretek's key purchaser and purchasing trends counsel.
Dana decides to permission Futuretek and initiate her own computer remnant matter. Before she permissions, she makes a delineation of the two databases on a manageable arduous importune. Dana uses the counsel to contiguity Futuretek's customers and adduce them cheaper, but similar, computer remnants unnatural by Dana's new troop, SmartChip.
Futuretek becomes sensible of Dana's actions and asks you, the pre-eminent operations administrator, for command and recommendations on what to do.
In a 5- to 10-slide Microsoft® PowerPoint® or Prezi® delivery, consummate the following:
Determine whether Dana has enslaved Futuretek's subjective wealth (IP), and if so, picture the emblem(s) of IP that was enslaved.
Explain any urbane actions in tort or felonious actions that may be brought opposite Dana or SmartChip.
Assume Futuretek sues SmartChip, and Futuretek wins the lawsuit. Recommend ghostly policies that SmartChip can put into settle to checkmate coming legitimate claims and litigation opposite the troop.
Recommend facilitate government procedures that Futuretek can appliance to eschew or season this emblem of distillation from happening to the troop in the coming.
Cite a insufficiency of two references according to APA guidelines and preferably peer-reviewed. Do not mention to dictionaries or encylopedias.