We (looked) at all the available evidence of what the attackers did, and as we looked at that, we don’t see any evidence that these are the kinds of attackers that did access the data, or did anything to take that data, however, in an abundance of caution, we don’t want to depend on our judgment alone.