Employ discovery techniques, processes, and tools to determine if external entities are replicating organizational information in an unauthorized manner.