During a presentation, a client removes confidential proposal materials from the presenter’s laptop
via an IR connection. This behavior is expressly prohibited by the company. The client’s location in
the audience is immediately identified. Which of the following should the technician do NEXT?
A.
Track the evidence
B.
Report to the proper channel
C.
Identify the information compromised
D.
Document the security breach