Thank you, Madam Speaker. I do appreciate the offer and certainly the public has not heard one iota that speaks to how those protocols are triggered within the system.
Is there a computerized system that pops up, alerts the administrator that files are being searched by unauthorized people, even though they are authorized on the system at large, and indicates that they’re spending time reviewing files that they shouldn’t be? Quite frankly, I think the public deserves some clarity on this issue because potentially folks could be out there searching. We don’t know if that’s the case, so I’m boiling it down to how is the system designed, what alerts the administrator and how do we ensure private information is protected.
I don’t want to be told we’ll sit down later and talk about it. I want to be told now and I think that should be shared with the public. Thank you.