Watch this video on YouTube
When an employee is suspected of utilizing a company computer for fraudulent activities, what is of utmost importance for you to ensure, given the organization's policy that prosecutes all criminal activity?