.The technique opens up a much deeper investigation in to whether the technology business person neglected to resist the escalate of prohibited material on the application.