. . . "No matter what, you have to wonder why the guy was allowed to use his personal computer or to use any computer for this data that hadn't been checked first for viruses or other vulnerabilities." .