2. Auditors request data. They don’t plug in external hard drives to systems where they audit. No one does that unless they are stealing data. They don’t rewrite code in systems they don’t own or aren’t responsible for running.

Comments