{"id":3557,"date":"2025-12-12T01:16:44","date_gmt":"2025-12-12T07:16:44","guid":{"rendered":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/?p=3557"},"modified":"2025-12-18T01:32:56","modified_gmt":"2025-12-18T07:32:56","slug":"simplifying-compliance-staying-ahead-of-hipaa-pci-and-gdpr-requirements","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/simplifying-compliance-staying-ahead-of-hipaa-pci-and-gdpr-requirements\/","title":{"rendered":"Simplifying Compliance: Staying Ahead of HIPAA, PCI, and GDPR Requirements"},"content":{"rendered":"<p><span style=\"font-weight: 400\">In today\u2019s digital-first business landscape, data protection and privacy compliance are not optional\u00a0 they\u2019re essential. From patient records in healthcare to customer payment data in retail, businesses must follow strict laws like <\/span><b>HIPAA<\/b><span style=\"font-weight: 400\">, <\/span><b>PCI DSS<\/b><span style=\"font-weight: 400\">, and <\/span><b>GDPR<\/b><span style=\"font-weight: 400\"> to safeguard sensitive information and maintain customer trust.<\/span><\/p>\n<p><span style=\"font-weight: 400\">However, compliance can be overwhelming for small and mid-sized businesses (SMBs). Each framework comes with different requirements, audits, and technical safeguards\u00a0 and noncompliance can lead to hefty penalties or data breaches. <\/span><span style=\"font-weight: 400\">With the right strategy and support from experts like CMIT Solutions of Charleston, staying compliant doesn\u2019t have to be complex or costly.<\/span><\/p>\n<h2><b>Understanding Regulatory Compliance in Today\u2019s Digital World<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Regulatory compliance ensures businesses handle, store, and process data securely while adhering to legal standards. <\/span><span style=\"font-weight: 400\">Each regulation focuses on protecting specific types of data:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\">HIPAA (Health Insurance Portability and Accountability Act): Protects medical and patient information.<\/li>\n<li style=\"font-weight: 400\">PCI DSS (Payment Card Industry Data Security Standard): Governs credit card transactions and financial security.<\/li>\n<li style=\"font-weight: 400\">GDPR (General Data Protection Regulation): Ensures privacy rights for individuals in the European Union.<span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Managed IT partners simplify compliance by implementing<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/cybersecurity-compliance-a-complete-guide-to-it-standards\/\"> <span style=\"font-weight: 400\">cybersecurity compliance<\/span><\/a><span style=\"font-weight: 400\"> frameworks that align technical safeguards with industry laws reducing risk, improving efficiency, and maintaining data integrity.<\/span><\/p>\n<h2><b>Why Compliance Matters More Than Ever<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The rise in cyberattacks and digital transactions has made data protection a top business priority.<\/span><\/p>\n<h3><b>Here\u2019s why compliance is critical:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\">Avoid costly fines and penalties from regulators.<\/li>\n<li style=\"font-weight: 400\">Protect customer trust by showing commitment to data privacy.<\/li>\n<li style=\"font-weight: 400\">Reduce downtime and reputational damage caused by breaches.<\/li>\n<li style=\"font-weight: 400\">Meet client and partner expectations in regulated industries.<span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Businesses that adopt<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/why-proactive-it-support-is-the-secret-to-business-continuity\/\"> <span style=\"font-weight: 400\">proactive support<\/span><\/a><span style=\"font-weight: 400\"> and auditing systems can identify compliance gaps before they become violations, ensuring smooth operations and peace of mind.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter  wp-image-3560\" src=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/12\/Copy-of-cmit-boise-featured-image-2025-12-18T015736.109-1024x535.png\" alt=\"\" width=\"769\" height=\"402\" srcset=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/12\/Copy-of-cmit-boise-featured-image-2025-12-18T015736.109-1024x535.png 1024w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/12\/Copy-of-cmit-boise-featured-image-2025-12-18T015736.109-300x157.png 300w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/12\/Copy-of-cmit-boise-featured-image-2025-12-18T015736.109-768x401.png 768w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/12\/Copy-of-cmit-boise-featured-image-2025-12-18T015736.109.png 1200w\" sizes=\"(max-width: 769px) 100vw, 769px\" \/><\/p>\n<h2><b>HIPAA Compliance: Safeguarding Patient Health Information<\/b><\/h2>\n<p><span style=\"font-weight: 400\">For healthcare organizations and any business handling medical data, HIPAA compliance is mandatory. It defines how <\/span><b>Protected Health Information (PHI)<\/b><span style=\"font-weight: 400\"> must be stored, transmitted, and accessed.<\/span><\/p>\n<h3><b>HIPAA Best Practices Include:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Encrypting all digital records during transfer and storage.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Limiting access using role-based permissions.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Maintaining secure backups and recovery options.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Conducting annual risk assessments.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Training employees on data handling and privacy policies.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Using<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/encrypt-everything-the-importance-of-securing-business-emails-in-2025\/\"> <span style=\"font-weight: 400\">encrypt everything<\/span><\/a><span style=\"font-weight: 400\"> strategies, healthcare providers and administrators ensure patient data remains secure against unauthorized access or accidental leaks. <\/span><span style=\"font-weight: 400\">A reliable MSP also ensures HIPAA compliance documentation and audit trails are maintained accurately for inspections or reviews.<\/span><\/p>\n<h2><b>PCI DSS Compliance: Protecting Financial Transactions<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Any company that processes, stores, or transmits credit card information must comply with <\/span><b>PCI DSS<\/b><span style=\"font-weight: 400\">. This standard protects customers\u2019 financial data and prevents fraud. <\/span><span style=\"font-weight: 400\">Businesses can achieve compliance through<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/why-reliable-network-management-is-the-backbone-of-modern-business\/\"> <span style=\"font-weight: 400\">secure network management<\/span><\/a><span style=\"font-weight: 400\">, encrypted payment systems, and frequent vulnerability scans.<\/span><\/p>\n<h3><b>Core PCI Requirements:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Maintain a secure network infrastructure.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Encrypt cardholder data across all systems.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Regularly update and patch payment software.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Implement multi-factor authentication for payment systems.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Monitor and log all system access.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Working with MSPs helps automate PCI reporting and maintain continuous compliance across multiple platforms.<\/span><\/p>\n<h2><b>GDPR Compliance: Protecting Customer Privacy Worldwide<\/b><\/h2>\n<p><span style=\"font-weight: 400\">GDPR applies to any company handling personal data of EU citizens, even if the business operates outside Europe. This regulation emphasizes transparency, consent, and data minimization.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Key principles include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Data must be collected for a specific purpose.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Customers have the right to access and delete their data.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Companies must report breaches within 72 hours.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Organizations can maintain GDPR compliance with<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/are-you-really-compliant-hidden-gaps-that-could-trigger-costly-audits\/\"> <span style=\"font-weight: 400\">data governance solutions<\/span><\/a><span style=\"font-weight: 400\"> and proactive monitoring to ensure ongoing privacy standards.<\/span><\/p>\n<h2><b>Common Compliance Challenges Businesses Face<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Despite understanding the importance of compliance, many organizations struggle with execution.<\/span><\/p>\n<h3><b>Common Issues Include:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Complex and changing regulations.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Lack of in-house cybersecurity expertise.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Manual reporting processes prone to human error.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Limited visibility into data flows across cloud environments.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">A<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/smart-scaling-how-managed-it-services-support-business-growth-without-growing-pains\/\"> <span style=\"font-weight: 400\">smart scaling<\/span><\/a><span style=\"font-weight: 400\"> approach, powered by Managed IT Services, ensures compliance processes adapt as businesses expand, maintaining security without compromising agility.<\/span><\/p>\n<h2><b>Leveraging Managed IT Services for Compliance Success<\/b><\/h2>\n<p><span style=\"font-weight: 400\">For SMBs, compliance isn\u2019t just about passing audits, it&#8217;s about maintaining a secure, trustworthy infrastructure. Managed IT Services providers deliver compliance-focused solutions that automate security controls, audits, and documentation.<\/span><\/p>\n<h3><b>How MSPs Simplify Compliance:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Continuous monitoring of systems for suspicious activity.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Automatic patch management and software updates.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Secure<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/how-cloud-first-solutions-are-transforming-remote-and-hybrid-work\/\"> <span style=\"font-weight: 400\">cloud-first solutions<\/span><\/a><span style=\"font-weight: 400\"> for data protection.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Centralized dashboards for compliance reporting.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Integration with existing IT infrastructure.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Managed IT support gives SMBs the advantage of enterprise-grade compliance tools \u2014 without the overhead costs of in-house management.<\/span><\/p>\n<h2><b>Building a Culture of Compliance<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Technology alone isn\u2019t enough. Employees play a vital role in maintaining compliance. Regular training and communication create awareness and accountability across the organization.<\/span><\/p>\n<h3><b>Actionable Steps:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Conduct quarterly data privacy workshops.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Implement<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/from-passwords-to-protection-building-a-stronger-front-line-against-cyber-attacks\/\"> <span style=\"font-weight: 400\">phishing defense<\/span><\/a><span style=\"font-weight: 400\"> simulations.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Enforce password rotation policies and MFA.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Review and update compliance policies regularly.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">A culture of compliance ensures employees understand both the \u201cwhy\u201d and \u201chow\u201d behind data protection, turning human risk into human defense.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter  wp-image-3559\" src=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/12\/Copy-of-cmit-boise-featured-image-2025-12-18T015831.309-1024x535.png\" alt=\"\" width=\"731\" height=\"382\" srcset=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/12\/Copy-of-cmit-boise-featured-image-2025-12-18T015831.309-1024x535.png 1024w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/12\/Copy-of-cmit-boise-featured-image-2025-12-18T015831.309-300x157.png 300w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/12\/Copy-of-cmit-boise-featured-image-2025-12-18T015831.309-768x401.png 768w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/12\/Copy-of-cmit-boise-featured-image-2025-12-18T015831.309.png 1200w\" sizes=\"(max-width: 731px) 100vw, 731px\" \/><\/p>\n<h2><b>Continuous Monitoring and Auditing<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Compliance isn\u2019t a one-time effort \u2014 it\u2019s an ongoing process that evolves with technology. Regular audits, assessments, and continuous monitoring keep systems compliant as regulations change. <\/span><span style=\"font-weight: 400\">Using<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/how-proactive-it-monitoring-prevents-downtime-before-it-starts\/\"> <span style=\"font-weight: 400\">proactive monitoring<\/span><\/a><span style=\"font-weight: 400\">, MSPs detect irregularities early, ensuring compliance metrics are always met. <\/span><span style=\"font-weight: 400\">Automation tools help track:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Access control and login activities.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Data sharing between applications.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Changes in compliance status.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Real-time alerts on breaches or anomalies.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">This proactive approach ensures that SMBs stay compliant\u00a0 not just during audits, but every single day.<\/span><\/p>\n<h2><b>Why SMBs Can\u2019t Afford Noncompliance<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The consequences of ignoring compliance are far-reaching. From loss of customer trust to devastating fines, the financial and reputational impact can cripple a business.<\/span><\/p>\n<p><span style=\"font-weight: 400\">A single data breach can result in legal action, customer churn, and massive recovery costs. However, with<\/span><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/blog\/disaster-recovery-for-small-businesses-a-plan-you-cant-afford-to-skip\/\"> <span style=\"font-weight: 400\">disaster recovery<\/span><\/a><span style=\"font-weight: 400\"> and managed cybersecurity frameworks, SMBs can minimize risks and strengthen their resilience against violations.<\/span><\/p>\n<h2><b>Conclusion: Simplifying Compliance for Lasting Success<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Staying compliant with HIPAA, PCI, and GDPR may seem daunting, but with the right technology and partner, it becomes a seamless, proactive process.<\/span><\/p>\n<p><span style=\"font-weight: 400\">CMIT Solutions of Charleston helps SMBs simplify compliance through automation, cybersecurity, and proactive management\u00a0 keeping your systems secure, your clients confident, and your business audit-ready at all times. <\/span><span style=\"font-weight: 400\">In a world where data is currency, compliance isn\u2019t just a requirement\u00a0 it\u2019s a strategic advantage. Partner with experts who make it simple, secure, and scalable.<\/span><\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/contact-us\/\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2539\" src=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/05\/Banner-2-1024x341-1-1.png\" alt=\"\" width=\"1024\" height=\"341\" srcset=\"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/05\/Banner-2-1024x341-1-1.png 1024w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/05\/Banner-2-1024x341-1-1-300x100.png 300w, https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-content\/uploads\/sites\/48\/2025\/05\/Banner-2-1024x341-1-1-768x256.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s digital-first business landscape, data protection and privacy compliance are not&#8230;<\/p>\n","protected":false},"author":316,"featured_media":3558,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[22,30,54,97,21,25,141,16,47,95,19,55,35,51,50,29],"class_list":["post-3557","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it","tag-amy-justis","tag-business-community","tag-business-continuity","tag-business-solutions","tag-charleston-regional-business-journal","tag-client-satisfaction","tag-cmit-charleston","tag-cmit-solutions","tag-customization","tag-it-infrastructure","tag-it-outsourcing","tag-it-support","tag-itinfrastructure","tag-maintenance","tag-proactivemonitoring","tag-technological-landscape"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/posts\/3557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/users\/316"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/comments?post=3557"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/posts\/3557\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/media\/3558"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/media?parent=3557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/categories?post=3557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/charleston-sc-1165\/wp-json\/wp\/v2\/tags?post=3557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}