Critique Potential Violations Using Information Technology