As a new member of the IT department you have noticed that confidential information has been leaked several times. This may damage the reputation of the company. You have been asked to propose an
organisational measure to protect laptop computers. What is the first step in a structured approach to come up with this measure?
In the event of an Information security incident, system users' roles and responsibilities are to be observed, except: