They’re going to try to do some forensic work because those documents probably have been changed [over time], so that enables them to narrow down the period to when they were taken, once you say ‘this seems like it was a snapshot from this particular time,’ then they can look at audit logs of who had access to the document during that time frame.