This is a dedicated watch page for a single video.
You have noticed a trend of employees accessing confidential documents they do not have clearance for and need to address the issue. What type of control is MOST effective by themselves in ensuring that only authorized users have access to sensitive information?