Our office does audits, as we did for the passenger protect program, precisely for that reason. As I stated earlier, first and foremost, we will require justification for the invasion of privacy. Why do you need this information? How is it proportionate to your objective?
Once you have collected this information, we will look into whether the government protects it absolutely securely. We all know that the government is the greatest holder of personal information and the holder of the most sensitive personal information. Therefore, there cannot be a leak. That is why we exercise our audit functions to regularly check in and look at how the technological infrastructure is protecting personal information.