. . . "This would focus on identifying two things: first, which employees or teams are the most likely to be tempted to remove information or try to take customers when they leave." . .