5. you are able to types of privacy violations by enterprises