Response 3 Evaluate the risk of data exfiltration HIGH