an employee handles key management and has learned that a user has used the same key pair for encrypting documents and digitally signing emails. prioritize all actions that should be taken and determine the first action that the employee should take.