To make an analogy, a sieve with its holes plugged is never going to hold water as well as a bucket. That being said, they would have entered the data onto computer systems anyway. It's a matter of whether the method of collection opened the door to unauthorized access.
Markus
|