This document summarizes a paper that proposes two optimization issues to identify data leakage by untrusted agents without disturbing trusted agents. The first issue selects data objects for monitoring that are accessed by at most c trusted agents while ensuring access to at least k monitored objects by each untrusted agent. The second issue selects monitored data objects to maximize the number accessed by untrusted agents while ensuring each trusted agent accesses no more than d monitored objects. The goal is to maximize detection of data misuse by untrusted agents while minimizing monitoring effort and avoiding disturbance to trusted agents.