An end user receives an unsolicited and unencrypted email containing a co-workers birth date and social security number. The end user should immediately contact
the IT department and report a violation of which of the following policies?
A.
DRM
B.
EULA
C.
IRP
D.
PII