Thank you.
I'm sorry, Mr. Chair. I'm going to split my time with Mr. Lametti.
One of the main arguments made by opponents to the safe harbours in the act is a challenge to the “dumb pipe” theory. Can you describe the extent to which ISPs can identify the content of data they transmit?