Mechanisms exist to monitor for evidence of unauthorized exfiltration or disclosure of organizational information.
Does the organization monitor for evidence of unauthorized exfiltration or disclosure of organizational information?