.The technique opens up a much deeper investigation right into whether the technology business owner fell short to respond to the escalate of prohibited information on the application.