So, part of what you’re saying though is that there are existing cybersecurity laws that you’re leveraging to enable this?
j previous speech k next speech