FIG. 4 illustrates an example of data 232, application 230, and a data object 212. In the example of FIG. 4, data 232 may refer to a medical report, which was mailed on 25 Mar. 2016. As further shown in this figure, data 232 may also include sensitive data 234, which may further include a Social Security number, a credit card (e.g., VISA) number, and a telephone number. The arrow from data 232 to application 230 indicates that monitoring module 104 may monitor the data that application 230 accesses, attempts to access, and/or has authorization or ability to access. In this example, monitoring module 104 may monitor application 230 and thereby detect that application 230 has accessed data 232. Moreover, scanning module 106 may scan data 232 and then detect that data 232 includes sensitive data 234, as further outlined above. In view of the above, flagging module 108 may flag application 230 as having accessed sensitive data. For example, flagging module 108 may determine that the amount of sensitive data accessed by application 230 is greater than the predefined threshold (which may be zero or some other nonzero amount of arbitrary size), as outlined above.