This is a dedicated watch page for a single video.
You suspect that Bob, an employee, is leaking confidential documents to a competitor. While awaiting the results of an internal investigation, you need to limit Bob's access to sensitive data immediately without arousing suspicion. What should you do?