This is a dedicated watch page for a single video.
As a security analyst evaluating the effectiveness of your organization's Data Loss Prevention (DLP) system, which of the following situations falls outside the purview of DLP's intended functionality?