This section is extracted from the Cybersecurity Policy.