Responsibility for investigating acceptable computer use violations often falls within the scope of the Information Technology department of an organization, because that is where the technical expertise resides. Either the system administrator or a focused information security response team member...