Cumulus Cloud Computing Services, Inc., suffers a security breach in its computer network. Before the company discovers the breach, the perpetrator obtains a large amount of confidential data, including corporate financial records, marketing plans, and other sensitive information. Has a crime been committed? If so, what are its elements? What steps might Cumulus take to ensure that going forward only authorized users access the data on its computers? Whose efforts—those of the federal government or Cumulus—are more important in securing the company’s computer infrastructure, and why?