Now with Bill S-4, you are going to have more reporting, breach reporting, that will come from the private sector.
Just for those of us who are not well-informed of the protocol, just so we understand where the resources should be allocated, can you give us a very brief overview of the way a breach flows thorough the system once it is reported, so we know what components are involved in assessing that breach?