{"id":2196,"date":"2025-08-28T15:26:35","date_gmt":"2025-08-28T15:26:35","guid":{"rendered":"https:\/\/khalifaintelligence.com\/?p=2196"},"modified":"2025-08-29T11:06:58","modified_gmt":"2025-08-29T11:06:58","slug":"test-business-category","status":"publish","type":"post","link":"https:\/\/khalifaintelligence.com\/ms\/test-business-category\/","title":{"rendered":"Data Sovereignty For Dummies"},"content":{"rendered":"<figure id=\"attachment_2209\" aria-describedby=\"caption-attachment-2209\" style=\"width: 752px\" class=\"wp-caption alignnone\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-2209\" src=\"https:\/\/khalifaintelligence.com\/wp-content\/uploads\/2025\/08\/unnamed-1-300x300.png\" alt=\"\" width=\"752\" height=\"752\" srcset=\"https:\/\/khalifaintelligence.com\/wp-content\/uploads\/2025\/08\/unnamed-1-300x300.png 300w, https:\/\/khalifaintelligence.com\/wp-content\/uploads\/2025\/08\/unnamed-1-150x150.png 150w, https:\/\/khalifaintelligence.com\/wp-content\/uploads\/2025\/08\/unnamed-1-12x12.png 12w, https:\/\/khalifaintelligence.com\/wp-content\/uploads\/2025\/08\/unnamed-1.png 512w\" sizes=\"(max-width: 752px) 100vw, 752px\" \/><figcaption id=\"caption-attachment-2209\" class=\"wp-caption-text\">Rule your Digital Kingdom with Nine Lives of Control<\/figcaption><\/figure>\n<h1 data-start=\"0\" data-end=\"32\">Data Sovereignty for Dummies<\/h1>\n<p data-start=\"33\" data-end=\"96\"><em data-start=\"33\" data-end=\"96\">(and brilliant, busy people who don\u2019t have time for legalese)<\/em><\/p>\n<p data-start=\"98\" data-end=\"426\">Picture your data as a celebrity cat. It travels, it\u2019s in photos everywhere, and strangers keep trying to pet it. <strong data-start=\"212\" data-end=\"232\">Data sovereignty<\/strong> is the rulebook that says <strong data-start=\"259\" data-end=\"380\">where your cat is allowed to nap, who\u2019s allowed to touch it, and which country\u2019s laws apply when it scratches someone<\/strong>. That\u2019s it. No robes, no gavels\u2014just control.<\/p>\n<h2 data-start=\"428\" data-end=\"452\">The 10-second version<\/h2>\n<ul data-start=\"453\" data-end=\"772\">\n<li data-start=\"453\" data-end=\"512\">\n<p data-start=\"455\" data-end=\"512\"><strong data-start=\"455\" data-end=\"473\">Data residency<\/strong>: <em data-start=\"475\" data-end=\"482\">Where<\/em> your data physically lives.<\/p>\n<\/li>\n<li data-start=\"513\" data-end=\"576\">\n<p data-start=\"515\" data-end=\"576\"><strong data-start=\"515\" data-end=\"535\">Data sovereignty<\/strong>: <em data-start=\"537\" data-end=\"549\">Which laws<\/em> claim authority over it.<\/p>\n<\/li>\n<li data-start=\"577\" data-end=\"643\">\n<p data-start=\"579\" data-end=\"643\"><strong data-start=\"579\" data-end=\"600\">Data localization<\/strong>: \u201cDon\u2019t let it leave the country. Ever.\u201d<\/p>\n<\/li>\n<li data-start=\"644\" data-end=\"772\">\n<p data-start=\"646\" data-end=\"772\"><strong data-start=\"646\" data-end=\"665\">Sovereign cloud<\/strong>: Cloud setups designed so your data (and keys) follow your country\u2019s rules, not some far-away court order.<\/p>\n<\/li>\n<\/ul>\n<h2 data-start=\"774\" data-end=\"826\">Why you should care (even if you\u2019re not a lawyer)<\/h2>\n<ol data-start=\"827\" data-end=\"1112\">\n<li data-start=\"827\" data-end=\"883\">\n<p data-start=\"830\" data-end=\"883\"><strong data-start=\"830\" data-end=\"844\">Regulators<\/strong> care. Fines are the opposite of fun.<\/p>\n<\/li>\n<li data-start=\"884\" data-end=\"921\">\n<p data-start=\"887\" data-end=\"921\"><strong data-start=\"887\" data-end=\"900\">Customers<\/strong> care. Trust sells.<\/p>\n<\/li>\n<li data-start=\"922\" data-end=\"993\">\n<p data-start=\"925\" data-end=\"993\"><strong data-start=\"925\" data-end=\"935\">Courts<\/strong> care. Subpoenas travel faster than your lawyer\u2019s lunch.<\/p>\n<\/li>\n<li data-start=\"994\" data-end=\"1112\">\n<p data-start=\"997\" data-end=\"1112\"><strong data-start=\"997\" data-end=\"1004\">You<\/strong> care\u2014when a backup turns out to be in another country, owned by another company, using another set of laws.<\/p>\n<\/li>\n<\/ol>\n<h2 data-start=\"1114\" data-end=\"1156\">Cloud is just\u2026 other people\u2019s computers<\/h2>\n<p data-start=\"1157\" data-end=\"1466\">There is no \u201ccloud kingdom.\u201d There are warehouses with blinking lights, owned by providers, spread across regions. The moment your data crosses a border\u2014physically or by who can access it\u2014it can become subject to someone else\u2019s rules. You didn\u2019t \u201close control\u201d; you just outsourced it without reading the map.<\/p>\n<h2 data-start=\"1468\" data-end=\"1522\">What \u201cgood\u201d looks like (minus the techno-mysticism)<\/h2>\n<p data-start=\"1523\" data-end=\"1563\"><strong data-start=\"1523\" data-end=\"1563\">Think: eight simple building blocks.<\/strong><\/p>\n<ol data-start=\"1565\" data-end=\"2577\">\n<li data-start=\"1565\" data-end=\"1658\">\n<p data-start=\"1568\" data-end=\"1658\"><strong data-start=\"1568\" data-end=\"1591\">Classify your data.<\/strong> Public, internal, confidential, secret. Label it like leftovers.<\/p>\n<\/li>\n<li data-start=\"1659\" data-end=\"1804\">\n<p data-start=\"1662\" data-end=\"1804\"><strong data-start=\"1662\" data-end=\"1679\">Map the flow.<\/strong> Where is data collected, stored, backed up, processed, and viewed? Draw arrows. If you can\u2019t draw it, you can\u2019t govern it.<\/p>\n<\/li>\n<li data-start=\"1805\" data-end=\"1907\">\n<p data-start=\"1808\" data-end=\"1907\"><strong data-start=\"1808\" data-end=\"1835\">Pick the right regions.<\/strong> Pin your data to specific locations. Avoid mystery \u201cglobal\u201d settings.<\/p>\n<\/li>\n<li data-start=\"1908\" data-end=\"2072\">\n<p data-start=\"1911\" data-end=\"2072\"><strong data-start=\"1911\" data-end=\"1928\">Own the keys.<\/strong> Encrypt at rest and in transit. Use customer-managed keys (ideally in a Hardware Security Module). If they own the key, they own the silence.<\/p>\n<\/li>\n<li data-start=\"2073\" data-end=\"2178\">\n<p data-start=\"2076\" data-end=\"2178\"><strong data-start=\"2076\" data-end=\"2095\">Control access.<\/strong> Least privilege. No shared admin accounts. Log every \u201cwho looked at what, when.\u201d<\/p>\n<\/li>\n<li data-start=\"2179\" data-end=\"2348\">\n<p data-start=\"2182\" data-end=\"2348\"><strong data-start=\"2182\" data-end=\"2211\">Guard cross-border moves.<\/strong> Set rules for exports, vendor support access, and analytics jobs that \u201ctemporarily\u201d leave the region. Temporary is how forever begins.<\/p>\n<\/li>\n<li data-start=\"2349\" data-end=\"2485\">\n<p data-start=\"2352\" data-end=\"2485\"><strong data-start=\"2352\" data-end=\"2377\">Lifecycle discipline.<\/strong> Keep only what you need. Rotate keys. Delete with proof. \u201cArchived forever\u201d is future-you\u2019s horror story.<\/p>\n<\/li>\n<li data-start=\"2486\" data-end=\"2577\">\n<p data-start=\"2489\" data-end=\"2577\"><strong data-start=\"2489\" data-end=\"2510\">Audit &amp; automate.<\/strong> Policy as code. Continuous checks. Screenshots are not governance.<\/p>\n<\/li>\n<\/ol>\n<h2 data-start=\"2579\" data-end=\"2623\">Myths that refuse to die (like bad memes)<\/h2>\n<ul data-start=\"2624\" data-end=\"3140\">\n<li data-start=\"2624\" data-end=\"2728\">\n<p data-start=\"2626\" data-end=\"2728\"><strong data-start=\"2626\" data-end=\"2663\">\u201cWe\u2019re encrypted, so we\u2019re done.\u201d<\/strong> Keys live somewhere. Someone holds them. That someone matters.<\/p>\n<\/li>\n<li data-start=\"2729\" data-end=\"2889\">\n<p data-start=\"2731\" data-end=\"2889\"><strong data-start=\"2731\" data-end=\"2778\">\u201cSovereignty means building a data center.\u201d<\/strong> Not necessarily. Smartly chosen cloud regions + your own keys + policy guardrails can be compliant and sane.<\/p>\n<\/li>\n<li data-start=\"2890\" data-end=\"2996\">\n<p data-start=\"2892\" data-end=\"2996\"><strong data-start=\"2892\" data-end=\"2923\">\u201cCloud can\u2019t be sovereign.\u201d<\/strong> It can\u2014if you configure it. Defaults are comfort food, not compliance.<\/p>\n<\/li>\n<li data-start=\"2997\" data-end=\"3140\">\n<p data-start=\"2999\" data-end=\"3140\"><strong data-start=\"2999\" data-end=\"3040\">\u201cLocalization will kill performance.\u201d<\/strong> Often false. Put compute near data, cache wisely, and stop hauling petabytes across oceans for fun.<\/p>\n<\/li>\n<\/ul>\n<h2 data-start=\"3639\" data-end=\"3684\">Vendor questions that fit on a sticky note<\/h2>\n<ol data-start=\"3685\" data-end=\"4305\">\n<li data-start=\"3685\" data-end=\"3738\">\n<p data-start=\"3688\" data-end=\"3738\">Where will our data be stored? Name the regions.<\/p>\n<\/li>\n<li data-start=\"3739\" data-end=\"3801\">\n<p data-start=\"3742\" data-end=\"3801\">Can we <strong data-start=\"3749\" data-end=\"3761\">hard-pin<\/strong> storage and backups to those regions?<\/p>\n<\/li>\n<li data-start=\"3802\" data-end=\"3869\">\n<p data-start=\"3805\" data-end=\"3869\">Who (including support staff) can access our data, from where?<\/p>\n<\/li>\n<li data-start=\"3870\" data-end=\"3925\">\n<p data-start=\"3873\" data-end=\"3925\">Do you support <strong data-start=\"3888\" data-end=\"3913\">customer-managed keys<\/strong> and HSMs?<\/p>\n<\/li>\n<li data-start=\"3926\" data-end=\"3981\">\n<p data-start=\"3929\" data-end=\"3981\">Are telemetry, logs, and analytics kept in-region?<\/p>\n<\/li>\n<li data-start=\"3982\" data-end=\"4039\">\n<p data-start=\"3985\" data-end=\"4039\">What leaves the region during incidents or upgrades?<\/p>\n<\/li>\n<li data-start=\"4040\" data-end=\"4101\">\n<p data-start=\"4043\" data-end=\"4101\">What\u2019s the <strong data-start=\"4054\" data-end=\"4077\">breach notification<\/strong> timeline and process?<\/p>\n<\/li>\n<li data-start=\"4102\" data-end=\"4148\">\n<p data-start=\"4105\" data-end=\"4148\">Can we get <strong data-start=\"4116\" data-end=\"4135\">full audit logs<\/strong> on demand?<\/p>\n<\/li>\n<li data-start=\"4149\" data-end=\"4222\">\n<p data-start=\"4152\" data-end=\"4222\">What\u2019s the <strong data-start=\"4163\" data-end=\"4176\">exit plan<\/strong>? Data format, egress, deletion certificate.<\/p>\n<\/li>\n<li data-start=\"4223\" data-end=\"4305\">\n<p data-start=\"4227\" data-end=\"4305\">Show us the architecture diagram. If it\u2019s a mystery box, that\u2019s your red flag.<\/p>\n<\/li>\n<\/ol>\n<h2 data-start=\"4633\" data-end=\"4669\">Tiny jargon decoder (no judgment)<\/h2>\n<ul data-start=\"4670\" data-end=\"4995\">\n<li data-start=\"4670\" data-end=\"4737\">\n<p data-start=\"4672\" data-end=\"4737\"><strong data-start=\"4672\" data-end=\"4679\">PII<\/strong>: Personal data about a human. Treat like nitroglycerin.<\/p>\n<\/li>\n<li data-start=\"4738\" data-end=\"4793\">\n<p data-start=\"4740\" data-end=\"4793\"><strong data-start=\"4740\" data-end=\"4751\">KMS\/HSM<\/strong>: Key vaults; HSMs are the armored kind.<\/p>\n<\/li>\n<li data-start=\"4794\" data-end=\"4856\">\n<p data-start=\"4796\" data-end=\"4856\"><strong data-start=\"4796\" data-end=\"4803\">DLP<\/strong>: Software that screams when secrets try to escape.<\/p>\n<\/li>\n<li data-start=\"4857\" data-end=\"4910\">\n<p data-start=\"4859\" data-end=\"4910\"><strong data-start=\"4859\" data-end=\"4873\">Zero Trust<\/strong>: \u201cWe verify everyone, every time.\u201d<\/p>\n<\/li>\n<li data-start=\"4911\" data-end=\"4995\">\n<p data-start=\"4913\" data-end=\"4995\"><strong data-start=\"4913\" data-end=\"4925\">DPA\/SCCs<\/strong>: Legal scaffolding for sending data across borders without heartburn.<\/p>\n<\/li>\n<\/ul>\n<h2 data-start=\"4997\" data-end=\"5047\">A one-page starter policy (steal this skeleton)<\/h2>\n<ul data-start=\"5048\" data-end=\"5732\">\n<li data-start=\"5048\" data-end=\"5136\">\n<p data-start=\"5050\" data-end=\"5136\"><strong data-start=\"5050\" data-end=\"5061\">Purpose<\/strong>: Keep data in approved regions; obey local laws; avoid surprise exports.<\/p>\n<\/li>\n<li data-start=\"5137\" data-end=\"5216\">\n<p data-start=\"5139\" data-end=\"5216\"><strong data-start=\"5139\" data-end=\"5148\">Scope<\/strong>: All systems, backups, logs, vendors, humans, and helpful robots.<\/p>\n<\/li>\n<li data-start=\"5217\" data-end=\"5287\">\n<p data-start=\"5219\" data-end=\"5287\"><strong data-start=\"5219\" data-end=\"5237\">Classification<\/strong>: Public \/ Internal \/ Confidential \/ Restricted.<\/p>\n<\/li>\n<li data-start=\"5288\" data-end=\"5351\">\n<p data-start=\"5290\" data-end=\"5351\"><strong data-start=\"5290\" data-end=\"5309\">Residency rules<\/strong>: Regions per class; backups must match.<\/p>\n<\/li>\n<li data-start=\"5352\" data-end=\"5433\">\n<p data-start=\"5354\" data-end=\"5433\"><strong data-start=\"5354\" data-end=\"5362\">Keys<\/strong>: Customer-managed, rotated; emergency access requires dual approval.<\/p>\n<\/li>\n<li data-start=\"5434\" data-end=\"5521\">\n<p data-start=\"5436\" data-end=\"5521\"><strong data-start=\"5436\" data-end=\"5446\">Access<\/strong>: Role-based, least privilege, MFA; support access time-boxed and logged.<\/p>\n<\/li>\n<li data-start=\"5522\" data-end=\"5579\">\n<p data-start=\"5524\" data-end=\"5579\"><strong data-start=\"5524\" data-end=\"5540\">Cross-border<\/strong>: Pre-approved routes only; document.<\/p>\n<\/li>\n<li data-start=\"5580\" data-end=\"5653\">\n<p data-start=\"5582\" data-end=\"5653\"><strong data-start=\"5582\" data-end=\"5606\">Retention &amp; deletion<\/strong>: Minimum viable hoarding; verifiable delete.<\/p>\n<\/li>\n<li data-start=\"5654\" data-end=\"5732\">\n<p data-start=\"5656\" data-end=\"5732\"><strong data-start=\"5656\" data-end=\"5670\">Monitoring<\/strong>: Continuous policy checks, quarterly audits, incident drills.<\/p>\n<\/li>\n<\/ul>\n<h2 data-start=\"5734\" data-end=\"5770\">Decision flow (the snack version)<\/h2>\n<ol data-start=\"5771\" data-end=\"5889\">\n<li data-start=\"5771\" data-end=\"5889\">\n<p data-start=\"5774\" data-end=\"5889\">Classify \u2192 2) Map flows \u2192 3) Pin regions \u2192 4) Own keys \u2192 5) Lock access \u2192 6) Guard borders \u2192 7) Prove it with logs.<\/p>\n<\/li>\n<\/ol>\n<h2 data-start=\"5891\" data-end=\"5914\">The vibe to remember<\/h2>\n<p data-start=\"5915\" data-end=\"6193\">Data sovereignty isn\u2019t anti-cloud, anti-growth, or anti-fun. It\u2019s <strong data-start=\"5981\" data-end=\"6023\">adult supervision for your information<\/strong>. Decide where your data sleeps, who can tuck it in, and which grown-ups get to set the rules. Then automate the boring parts so you can get back to building cool things.<\/p>","protected":false},"excerpt":{"rendered":"<p>Data Sovereignty for Dummies (and brilliant, busy people who don\u2019t have time for legalese) Picture your data as a celebrity cat. It travels, it\u2019s in photos everywhere, and strangers keep trying to pet it. Data sovereignty is the rulebook that says where your cat is allowed to nap, who\u2019s allowed to touch it, and which country\u2019s laws apply when it scratches someone. That\u2019s it. No robes, no gavels\u2014just control. The 10-second version Data residency: Where your data physically lives. Data sovereignty: Which laws claim authority over it. Data localization: \u201cDon\u2019t let it leave the country. Ever.\u201d Sovereign cloud: Cloud setups designed so your data (and keys) follow your country\u2019s rules, not some far-away court order. Why you should care (even if you\u2019re not a lawyer) Regulators care. Fines are the opposite of fun. Customers care. Trust sells. Courts care. Subpoenas travel faster than your lawyer\u2019s lunch. You care\u2014when a backup turns out to be in another country, owned by another company, using another set of laws. Cloud is just\u2026 other people\u2019s computers There is no \u201ccloud kingdom.\u201d There are warehouses with blinking lights, owned by providers, spread across regions. The moment your data crosses a border\u2014physically or by who can access it\u2014it can become subject to someone else\u2019s rules. You didn\u2019t \u201close control\u201d; you just outsourced it without reading the map. What \u201cgood\u201d looks like (minus the techno-mysticism) Think: eight simple building blocks. Classify your data. Public, internal, confidential, secret. Label it like leftovers. Map the flow. Where is data collected, stored, backed up, processed, and viewed? Draw arrows. If you can\u2019t draw it, you can\u2019t govern it. Pick the right regions. Pin your data to specific locations. Avoid mystery \u201cglobal\u201d settings. Own the keys. Encrypt at rest and in transit. Use customer-managed keys (ideally in a Hardware Security Module). If they own the key, they own the silence. Control access. Least privilege. No shared admin accounts. Log every \u201cwho looked at what, when.\u201d Guard cross-border moves. Set rules for exports, vendor support access, and analytics jobs that \u201ctemporarily\u201d leave the region. Temporary is how forever begins. Lifecycle discipline. Keep only what you need. Rotate keys. Delete with proof. \u201cArchived forever\u201d is future-you\u2019s horror story. Audit &amp; automate. Policy as code. Continuous checks. Screenshots are not governance. Myths that refuse to die (like bad memes) \u201cWe\u2019re encrypted, so we\u2019re done.\u201d Keys live somewhere. Someone holds them. That someone matters. \u201cSovereignty means building a data center.\u201d Not necessarily. Smartly chosen cloud regions + your own keys + policy guardrails can be compliant and sane. \u201cCloud can\u2019t be sovereign.\u201d It can\u2014if you configure it. Defaults are comfort food, not compliance. \u201cLocalization will kill performance.\u201d Often false. Put compute near data, cache wisely, and stop hauling petabytes across oceans for fun. Vendor questions that fit on a sticky note Where will our data be stored? Name the regions. Can we hard-pin storage and backups to those regions? Who (including support staff) can access our data, from where? Do you support customer-managed keys and HSMs? Are telemetry, logs, and analytics kept in-region? What leaves the region during incidents or upgrades? What\u2019s the breach notification timeline and process? Can we get full audit logs on demand? What\u2019s the exit plan? Data format, egress, deletion certificate. Show us the architecture diagram. If it\u2019s a mystery box, that\u2019s your red flag. Tiny jargon decoder (no judgment) PII: Personal data about a human. Treat like nitroglycerin. KMS\/HSM: Key vaults; HSMs are the armored kind. DLP: Software that screams when secrets try to escape. Zero Trust: \u201cWe verify everyone, every time.\u201d DPA\/SCCs: Legal scaffolding for sending data across borders without heartburn. A one-page starter policy (steal this skeleton) Purpose: Keep data in approved regions; obey local laws; avoid surprise exports. Scope: All systems, backups, logs, vendors, humans, and helpful robots. Classification: Public \/ Internal \/ Confidential \/ Restricted. Residency rules: Regions per class; backups must match. Keys: Customer-managed, rotated; emergency access requires dual approval. Access: Role-based, least privilege, MFA; support access time-boxed and logged. Cross-border: Pre-approved routes only; document. Retention &amp; deletion: Minimum viable hoarding; verifiable delete. Monitoring: Continuous policy checks, quarterly audits, incident drills. Decision flow (the snack version) Classify \u2192 2) Map flows \u2192 3) Pin regions \u2192 4) Own keys \u2192 5) Lock access \u2192 6) Guard borders \u2192 7) Prove it with logs. The vibe to remember Data sovereignty isn\u2019t anti-cloud, anti-growth, or anti-fun. It\u2019s adult supervision for your information. Decide where your data sleeps, who can tuck it in, and which grown-ups get to set the rules. Then automate the boring parts so you can get back to building cool things.<\/p>","protected":false},"author":3,"featured_media":2209,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,40],"tags":[],"class_list":["post-2196","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-technology","category-musings"],"_links":{"self":[{"href":"https:\/\/khalifaintelligence.com\/ms\/wp-json\/wp\/v2\/posts\/2196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/khalifaintelligence.com\/ms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/khalifaintelligence.com\/ms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/khalifaintelligence.com\/ms\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/khalifaintelligence.com\/ms\/wp-json\/wp\/v2\/comments?post=2196"}],"version-history":[{"count":5,"href":"https:\/\/khalifaintelligence.com\/ms\/wp-json\/wp\/v2\/posts\/2196\/revisions"}],"predecessor-version":[{"id":2224,"href":"https:\/\/khalifaintelligence.com\/ms\/wp-json\/wp\/v2\/posts\/2196\/revisions\/2224"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/khalifaintelligence.com\/ms\/wp-json\/wp\/v2\/media\/2209"}],"wp:attachment":[{"href":"https:\/\/khalifaintelligence.com\/ms\/wp-json\/wp\/v2\/media?parent=2196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/khalifaintelligence.com\/ms\/wp-json\/wp\/v2\/categories?post=2196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/khalifaintelligence.com\/ms\/wp-json\/wp\/v2\/tags?post=2196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}