Specific breach methods identified in — of — notifications. The remaining —% lack sufficient detail in state filings to determine a specific method.