Which of the following information types is MOST likely a violation of an email security policy?
A. Login credentials
B. Project schedules
C. Customer product information
D. Technical installation documents
A. Login credentials
B. Project schedules
C. Customer product information
D. Technical installation documents