The organization protects information obtained from intrusion-monitoring tools from unauthorized access.