She’s a traitor.
By using personal devices to retrieve e-mail from her private server when secure devices were available to retrieve e-mail from her private server demonstrates her intention to circumvent security and record keeping requirements.
She belongs in prison.