Unsurprisingly, much of what my colleagues have just said applies also to the New Democratic Party. We have a varying degrees of access protocol to ensure that folks who have access to the database only have access to the information that they require to do their tasks, and only a very small number of IT professionals have full access to the information.
We also have a terms of use policy that all users are required to read and understand and consent to before they are given access to their particular segment of the database. Also, as I mentioned in my opening statement, we are in the process of moving our database and our systems into the cloud, which will increase our ability to secure the information that is contained within it.
In terms of guarding against security breaches, we have a number of internal security protocols that are constantly under review and being developed and improved upon. We have ongoing threat monitoring to ensure that if a breach were to take place, we would be able to respond quickly, swiftly. We have protocols for notification, if such a situation were ever to arise to ensure that the folks whose information might have been compromised are informed of that situation.