How the company came into possession of and then used personal information is of particular interest to investigators