As you know, that technology had changed over a number of years. We have been involved in the security side of it for many years. Changes have been happening over a number of years.
In the past, people just got a threat and risk analysis, which is what the threats are, what the risks are and how to mitigate those kind of things. Nowadays, it's much more into the area where, with anything you develop—data or anything that people are trying to develop—people are looking to authenticate and authorize at every stage of the system. It is not only the technical side of it, but also the business side of it.
As I'm saying, CSEC has been really involved with different things. They do actually put out the guidelines for the whole government department.
As the technology has changed, obviously the process of security has also changed so far.