The companies that deploy IDLE can monitor access to the dummy files, which stand out from production data in that it has no legitimate reason for access. Any movement of the files—particularly ...