Imagine you have been contracted by a reputable organization, XYZ Corp, to assess their cybersecurity measures. During your investigation, you inadvertently discover evidence suggesting XYZ Corp's involvement in human trafficking. Which of the following would be the best thing to do?