When considering extent of a breach, the five considerations are...