Mechanisms exist to respond to sensitive information spills.
Does the organization respond to sensitive information spills?