An end user receives an unsolicited and unencrypted email containing a co-worker-s birth date and social security number. The end user should immediately contact
the IT department and report a violation of which of the following policies?
A. DRM
B. EULA
C. IRP
D. PII