This is a dedicated watch page for a single video.
You are the Information Security Manager of HDA Inc. What is the INITIAL step you should take upon discovering that users of an application frequently resort to emergency elevated access privileges for processing transactions?