Mr. Speaker, that is a very important question. The information in the one computer, which was being used as a server and which was stolen, contained old databases. They had to be rebuilt. We did it both electronically and manually. It was extremely labour intensive.
However we wanted to ensure that we were contacting the right people. We have done that. We are ensuring the people have the information they need so they can protect themselves. We are also conducting and I have ordered a thorough security review not only of our policies and of our sites but also to ensure that all our employees are up to date on our procedures.