I'm going to ask another question, and then I will yield the floor to Ms. Papillon.
Mr. Levin, in reply to the question put by my colleague Ms. Nash, you said we would need to have some idea of the privacy breaches which might occur, and not only of those that have already occurred
How could such a system be set up? It seems to me that this is something that we could consider in the future. How could we include the system in the act or in the mechanism regarding breach of privacy? Could you elaborate on that?