Thank you.
My colleagues across the aisle talk continuously about the security of the application and the use of the application, but in paragraph 1.74 you state that GC Strategies used two resources to check the cybersecurity of ArriveCAN and did not ensure that these resources had the adequate security clearances. Is that correct?