While reviewing sensitive electronic work papers, the IS auditor noticed that they were not encrypted. This could compromise the:
A、audit trail of the versioning of the work papers.
B、approval of the audit phases.
C、access rights to the work papers.
D、confidentiality of the work papers.