This is a dedicated watch page for a single video.
You are an information system auditor of HDA Inc. You are auditing the process of user access review. You noted that the user list used was not generated by the system. What is the main concern in this situation?