Thank you, Mr. Speaker. Around the EMR we actually have a significant number of firewalls and protocols in place to ensure that only people who have access or need to see that information have access to that information. I do know that there are lots of different technical requirements that an individual has to
meet in order to get in: passwords, fobs and other items so that the information remains secure and private only to those individuals who need access or have the right to access that information. Thank you.