Information security professionals are sometimes involved in communications that are confidential. These communications might be a component of a criminal investigation or a policy violation within the organization. It might also be communication of policy or procedural changes that need to be vetted and approved by senior management before being announced to the rank and file of the organization.
Discuss an example of an information-security-related communication that might occur within the area of interest you covered in your research paper. Include in the discussion the legal and ethical implications of violating the confidentiality of the communication described in your example.