 We have a well-defined process for validating posts who demonstrate compliance with the security standards. It starts off with a self-assessment. We provide the tools for a post to examine their own operations, and then they can see where they need to provide additional support for security or enact additional controls. Once that's in place, an independent team will review everything about a post operation, review their documentation, review their business resiliency, their disaster risk management plans. Once we are satisfied that everything is in compliance, we're very happy to issue them with one of the levels of certification that we provide.