From our perspective, the tool has never been used. If we were to use it, we have PIAs ready to go and available should that be the case.
We would be using this only further to our security mandate and by ensuring we follow the right protocols, which we have in place. Should this tool be necessary to investigate, then we would do a privacy assessment prior to using the tool.