So when we meet the IT people later this morning, it will be a good idea, first, to ask them what it is possible to know, what they can examine, what is left on the hard disks, the backup systems. We can ask them that. We can also look at what happened on the morning itself, to determine whether other emails exchanged with the five lobbyists were sent at the same time or not. We can ask them those questions.
Then, when we meet with the member in question, it will be a good idea to tell her that we have some information, but it is up to her to tell us whether she wants to cooperate. We have to get her permission; otherwise we will be on a dead-end street.