icing, legal events, mergers, joint ventures, and acquisitions; policy positions and analysis, such as white papers, and agendas and minutes from meetings involving high-ranking personnel; emails of high-ranking employees; and user credentials and network architecture information.