Sure. I guess what I'm trying to get at here is that I want to ensure we don't have a scenario where someone is able to have the device. A member could even choose to provide it to somebody and provide the password. How would we actually verify that it's being used by the members themselves?
On July 6th, 2020. See this statement in context.