Susan sends an email to Paul. Who determines the meaning and the value of information in this email?
It is allowed that employees and contractors are provided with an anonymous reporting channel to report violations of information security policies or procedures (''whistle blowing'')