* Enhanced levels of data protection and encryption;
* Enhanced ability to detect software intrusions within the network, unauthorized access and unusual activity patterns;
* Implementation of additional firewalls;
* Expediting a planned mover of the system to a new in a different location with enhanced security;
* Naming of new directly reporting to the chief information officer of Sony Corp.