Thank you, Mr. Chair.
The bottom line is whether we agree or disagree with allowing others to have access to computers without authorization. I would agree that we don't want to have that.
I want to clearly understand L-5. Does this strengthen or weaken a person's privacy?