Relevant provisions were also clarified to ???focus on the fact that the bill is designed to protect against unauthorized access to networks or systems, including unauthorized access aimed at stealing private or government information???.[18] In addition, already collected cyberthreat data can also be used to investigate ???the imminent threat of bodily harm to an individual??? or ???the exploitat