During a presentation, a client removes confidential proposal materials from the presenter’s laptop
via an IR connection. This behavior is expressly prohibited by the company. The client’s location in
the audience is immediately identified. Which of the following should the technician do NEXT?
A.
Track the evidence
B.
Report to the proper channel
C.
Identify the information compromised
D.
Document the security breach
Explanation:
Report this matter to your supervisor or manager. He can then escalate the problem to higher
authorities and take proper action to mitigate or rectify this digital theft.
B. Report to the proper channel