Watch this video on YouTube
Despite implementing information security policies, you notice a substantial number of exception requests. In this context, what is the MOST probable cause for this scenario?