This final activity can help you check your understanding of data security at work. Indicate whether or not each scenario is an example of an appropriate procedure for personal information security.