This is a dedicated watch page for a single video.
During an annual review, you discover that several employees have been accessing systems and data not relevant to their roles. As an Information Security Manager, what should be your immediate course of action?