There's always security risk. There is in the paper process as well. We have lists that are circulating in the campaigns and at the polls, and we have guidelines in place to make sure that they are recovered.
Electronic lists of voters and voters who have voted are also supplied by us to political parties. It's the entire environment that needs to be examined.
However, you're absolutely right that one of the aspects is making sure that there's good control on those devices once the information is loaded, when it's accessed and when it's recovered after the election process. That is integral to the security of the e-list solution.