. "Such knowledge can come from documents, emails, financial audits, forensic studies and any other information." . . . .