Which of the following is a fundamental principle of covert & overt investigation methods as it applies to Certified Security Investigator?