Sure. I guess what I'm trying to get at here is that I want to ensure we don't have a scenario where someone is able to have the device. A member could even choose to provide it to somebody and provide the password. How would we actually verify that it's being used by the members themselves?