The following actions are sources of breaches in computing except?