I need to avoid making it too technical but still plausible. Researching real file-sharing history could help add authenticity. Maybe reference real events or companies that faced similar issues as a parallel.