Thank you for the question, Mr. Chair.
I think the answer to your question really depends upon the sensitivity of the information that's going to be flowing through that machine. It will depend largely on where it's deployed, which is why typically when we do our assessment we have to do it in the context of an actual deployment, as opposed to a very general contract like this one, where it's not actually in the context of a deployment, but rather potentially for future acquisitions.
I think that's really where the crux of the matter is: where it's deployed, what the surrounding circumstances are, and specifically what type of information is going to transverse that product. That's going to determine the degree to which the risk is—