When a loss of proprietary information is discovered, which of the following steps should be taken first?