So we did the analysis using only login data. We separately did a sample anal— ysis on combined login and logout data, which was encrypted to comply with .