Thank you, Mr. Chair.
Mr. Green, that was a proper point of order, by the way.
Mr. Therrien, first of all, you have given us a lot to consider today. I want to thank you for your frankness.
I want to talk about data that's properly de-identified. You said it's always at risk through data matching. We know that through this process, or we've learned that through this process.... Telus collected the data. It was passed on to a secondary source called BlueDot, whose business is presumably to take that data, assess it and provide guidance to PHAC, which eventually became the customer.
What is the risk of data being de-identified by a company whose business it is to deal with this type of scenario? Just talk about the risk, if you will.