This is a dedicated watch page for a single video.
You are an information system auditor of HDA Inc. Your management has decided to monitor the emails of the employees to prevent unauthorized transmission of sensitive information via email attachments by employees. Before implementing the monitoring process, which of the following is the most important task?