Hey Rob;
Here's a question... if Mr. Y is in possession of *delicate* information which has the potential to be as disruptive to Poetâ„¢ and her shareholders & stakeholders as Poets globally disruptive capabilities, how can we be assured everything remains"secure"?
qx