In designing a proprietary information protection program, the area of greatest vulnerability is: