Skip to content

Why NIS 2 Has Sent Compliance Into Overdrive

A tectonic shift is underway in the compliance landscape. If your business touches the EU-whether through direct operations, digital service delivery, or appearing anywhere in the critical supply chain-NIS 2 is now reshaping your legal and operational footing. This is not a distant technical regulation for big telecoms or national assets: NIS 2 redraws the lines of “in-scope”, expands accountability from IT leads to Boards of Directors, and imposes fines and personal bans with a speed that makes legacy compliance models obsolete (ENISA).

Protection isn’t just about better technology-your Board’s digital signature is now the front line of legal exposure.

The era when compliance could quietly tick over in the background is finished. Regulators now expect real-time evidence-policies, risk logs, approvals, and staff training are no longer “on file,” they’re auditable, timestamped, and mapped to live business operations. Authorities update sector lists and supply chain exposures instantly, and your status can change overnight. Whether you’re a SaaS developer, health provider, cloud host, or logistics partner, the unsparing net of NIS 2 should trigger a frank evaluation: Are you prepared to defend compliance under new, public crosshairs?

Liability has migrated from IT issue to a live business risk-Board-level signatures now frame both compliance success and failure.

Legacy exemptions have vanished. Regulators and customers alike reject vague plans or outdated documentation. Even a “future upgrade” stance or deferred training now exposes not just audit gaps, but direct legal risk and reputational harm (CMS LawNow). The NIS 2 model replaces sporadic reviews with a continuous mesh of operational cycles: routine Board sign-off, staff training logs, live incident simulation, digital evidence registers, and a relentless chain of supplier due diligence. This is the new backdrop for operating-and thriving-in a regulated market.


Who Is Now in Scope Under NIS 2-and Why the Net Widened

NIS 2’s reach is sweeping and non-negotiable. Gone are the thresholds and carve-outs protecting mid-sized firms or digital service “support” roles. Nearly every sector-health, pharma, energy, water, logistics, IT development, managed services, digital and cloud providers, research, and waste management-is newly classified as “essential” or “important” if it feeds into regulated services or supply chains (ENISA).

Mid-size status is no longer a safe harbour; your sector reach and how you fit within supply chains can instantly redraw your regulatory fate.

The Breakdown: Entity Classifications and “SME” Myths

  • Essential Entities: Over 250 staff or €50M+ turnover-or any business fitting regulated sector definitions.
  • Important Entities: Over 50 staff or €10M+ turnover; all included if they play a defined “important” or supply role-even purely digital or support functions.
  • Absolute Inclusion: If you’re a cloud provider, internet exchange, DNS, data centre, critical infrastructure, or part of a digital logistics environment, you are “in” regardless of headcount or turnover.

Critically, NIS 2 brings into focus even smaller IT consultancies, SaaS firms, and managed service providers by virtue of their roles within customer-facing supply chains. Many businesses discover they are “in scope” not through direct notification, but because a supplier, client, or national authority updates a digital compliance register. It is prudent to monitor ENISA and national regulatory portals as the sole authoritative sources.

The Compliance Chain Is Now Bidirectional

Your compliance obligations transmit risk both upstream and downstream. Here’s a table mapping how roles in the supply chain shape your exposure:

Your Role Upstream Risk Downstream Risk Regulator Reach
Critical service provider High High National & sector authority
Supplier to in-scope entity Medium High Sector, buyer, cross-border
SME SaaS/IT outside core Medium Variable Supply chain audit

Any new contract, customer, or updated authority register can redraw who needs to comply, and when.

Real-world implication: Today’s “out-of-scope” team could suddenly become the next compliance hero-or headline failure-if there’s a breach in the supply chain or an authority updates sector coverage mid-year.




illustrations desk stack

Centralise risk, incidents, suppliers, and evidence in one clean platform.




What Does NIS 2 Actually Demand? Board Accountability and Living Evidence

NIS 2 resets expectations away from “best efforts” or static compliance packs. Boards, not just CISOs, are now responsible for proactive, ongoing compliance. The directive tasks Boards and management with visible, documented oversight: repeated risk reviews, timed policy sign-off, incident tracking, logged staff training, proof of supplier vetting, and up-to-date controls.

Auditors and customers no longer accept static intent-they require audit trails that show security and risk management as live, continuous, and visible.

Beyond Proxy Ownership

Board members and nominated managers must now put their name to scheduled compliance activities: logging risk reviews, approving (or refusing) control changes, signing incident records, and taking personal responsibility for supplier risk. Digital signatures, time-stamped logs, and role-based approvals are now market expectations (Goodwin Law)). Any reliance on “shadow ownership” or outdated delegation-like annual reviews left unsigned-puts individuals, not just companies, at real risk.

Incident Response: Compliance On the Clock

Reportable incidents under NIS 2 trigger a strict, three-phase timeline:

  • Initial notification: within 24 hours of detection.
  • Intermediate report: with technical detail, within 72 hours.
  • Final report: root cause, within a month.

These required timelines take precedence even over sector-specific rules (e.g., GDPR). Every step is scrutinised: a delayed supplier notification or a missed Board review can trigger both enforcement and negative procurement history (JDSupra).

Simultaneously, compliance is no longer one-off: every department must log and remediate staff training gaps, prove control adoption, and evidence supplier risk management in real time.

Compliance Practitioner’s Action List

1. ISMS Baseline

  • Establish or update your ISMS (ISO 27001 or DORA-aligned).
  • Digitise all risk, control, and asset registers-manual files will not stand up.

2. Board Engagement

  • Schedule, log, and digitally sign Board-level reviews and policy changes.
  • Audit trails for Board action or inaction are now mandated.

3. Incident Readiness

  • Pre-configure alerts for any breach or supply chain event.
  • Simulate, test, and log response processes; document remedial actions.

4. Supply Chain & Third Party Oversight

  • Update supplier inventories; ensure due diligence is logged.
  • Embed contract clauses for breach notification and ongoing monitoring.

These steps track directly to ENISA’s technical guidance and the evolving national bulletins (ENISA)).




Is Enforcement Real? Fines, Director Disqualification, and Reputational Risks in 2024

The short answer: Yes, enforcement is active, personal, and public. Fines under NIS 2 reach up to €10 million or 2% of global annual turnover for essential entities; €7 million or 1.4% for important entities. Board and director bans-filed in national or European registers-are no longer idle threats, but visible consequences for compliance failures or deliberate non-cooperation (CMS LawNow).

Real accountability walks in lockstep with proof. Board statements and unsigned policies now elevate, not reduce, regulatory risk.

Proactive Inspections and Visibility of Failure

Regulators, ENISA, and sector CSIRTs have activated unannounced audit powers. These are triggered by customer complaints, supply chain incidents, or live sector reviews (NIS 2 Directive). Trying to pass off aged policy documents or respond to new audits with old “best practises” is courting public exposure and reputational damage.

Breaches that start with a supplier, delayed reporting, or ignored vulnerabilities now travel up (not down) the compliance chain-Boards and senior officials included. Many national authorities are publishing enforcement actions and bans as signals to future buyers, partners, and directors (GT Law).

Key Enforcement Triggers Table:

Penalty Type Max Value Example Trigger Visibility
Fine-Essential €10M/2% turnover Board failure on active breach Public, cross-sector notification
Fine-Important €7M/1.4% turnover Supplier breach, delay in notice Buyer audits, sector alert lists
Director ban Board, multi-year Refusal to cooperate, negligence National/EU director registers



platform dashboard nis 2 crop on mint

Launch with a proven workspace and templates – just tailor, assign, and go.




What Does “Owning” Compliance Actually Mean Now?

In 2024 and beyond, owning compliance means more than passing the next audit. It means deploying integrated digital systems: a living ISMS, mapped evidence registers, audit logs, and clear, role-based authority from Boardroom to helpdesk. Shadow delegations and “policy sweeps” at deadline put your company directly in the regulator’s field of vision.

Compliance success is now measured by digital traceability-systems, not habits, define resilience.

Integrated System Benefits

Modern ISMS platforms like ISMS.online form the backbone of multi-framework compliance (NIS 2, ISO 27001, GDPR, DORA, sectoral overlays). These unify control mapping, risk registers, asset lists, supplier management, audit trails, and review cycles. Every change or review is logged, time-stamped, and instantly available for Board queries, auditor sampling, or regulatory probing (Dative-GPI)).

Board-level questions should now focus on:

  • Can we deliver audit-ready evidence covering all our regulated frameworks?
  • Are controls deduplicated and mapped across ISO, NIS 2, GDPR, and sector requirements?
  • How quickly can we respond to unannounced regulator checks-or sector supply chain inquiries?

ISMS.online equips you with instant Board review records, SoA (“Statement of Applicability”), evidence-attached controls, and predictive gap analytics-so you demonstrate “active” compliance.




How ISMS.online Bridges NIS 2 and ISO 27001-Accelerate & Simplify

Organisations with current ISO 27001 certification are often 80–90% NIS 2 compliant out of the box, because both standards emphasise the same digital evidence, control mapping, Board accountability, and operational reviews (ENISA). ISMS.online compresses the path further with mapped registers, Board-level sign-offs, workflow automation, and evidence-on-demand.

It’s not about a one-time checklist-continuous readiness is the new normal.

ISO 27001 / NIS 2 Compliance Bridge Table

NIS 2 Expectation Operational Response (ISMS.online/ISO 27001) 27001 Annex A Reference
Documented risk, regular reviews Automated registers, Board-scheduled reviews A.5.4, A.5.5, A.8.2
Board accountability Digital sign-off, management review logs Cl.9.3, A.5.2, A.5.35
Incident (24/72 hr) response Incident management system, alerting, evidence A.5.24–A.5.28, A.6.8
Supply chain risk management Supplier logs, contract audits, workflow alerts A.5.19–A.5.22
Business continuity BC/DR plans, automated tests, Board logs A.5.29, A.5.30
Staff engagement, audit trail Policy Packs, To-dos, acknowledgements A.6.3, A.5.26, Cl.7.3

Traceability Table: Triggered Actions to Evidence

Trigger Risk Update Control / SoA Link Evidence Logged
Supplier breach Reassess supplier risk A.5.19–A.5.22, A.8.8 Log update, audit entry
Encryption failure Policy review A.5.24–A.5.27, A.8.25 Incident log, change log
Missed reporting Board review escalation A.5.24, A.5.35, Cl.9.3 Board minute, escalation
Incomplete training Issue new risk, remedy A.6.3, A.5.26 HR record, completion log

These structures prevent last-minute “spreadsheet scrambles”-and keep your Board, not just IT, continuously audit-ready.




platform dashboard nis 2 crop on moss

From Articles 20–23 to audit plans – run and prove compliance, end-to-end.




Supply Chain, Ecosystem, and Contractual Accountability

Failure to vet and continuously monitor suppliers is now a direct risk vector: over 40% of serious cyber-security incidents originate in the supply chain, not at the audited company (GT Law).

Compliance is only as resilient as your least-prepared ecosystem partner-your weakest link is now your regulator’s first question.

Key Supply Chain Preparedness Points

  • Detailed, up-to-date supplier inventories and classification.
  • Contract logs for breach notification (e.g., 24/72 hr), encryption, audit rights.
  • Automated updates/alerts to sync supply chain risk with incident logs and Board records.
  • Internal verification: can you provide log-level evidence for supplier oversight, contract clauses, and incident escalation-immediately and on demand?

ISMS.online’s workflow tools readily coordinate supplier risk reviews, contract enforcement monitoring, and breach notification trails-so that your business doesn’t suffer from ecosystem drag.




Why Move Now? Building Continuous Compliance and Business Resilience with ISMS.online

With NIS 2, your legal and operational stakes move at regulator speed. ISMS.online turns compliance into a living process: logging every Board decision, mapping risk to controls, safeguarding evidence, tracking supplier interactions, and flagging drift before it drifts into audit gaps.

Real-time dashboards and implementation benchmarks keep your compliance and leadership team informed, not surprised. You benefit from a broader community of peers, industry updates, and cross-standard integration, blending Security, Privacy, and AI governance into a unified, adaptive approach.

Automate your compliance trail, map every risk update, and arm your Board with living evidence-so you’re always a step ahead, no matter how the compliance landscape evolves.

This Is More Than Checking Boxes-Its Your Competitive Differentiator

As regulations accelerate and enforcement gets personal, trusted compliance becomes business advantage. Whether unblocking a deal, defending against sector audits, or surfacing resilience at Board level, ISMS.online arms you to lead-not just survive-in a compliance-first world.

Equip your business for todays NIS 2 reality-digitally, securely, audibly. Own your audit trail, build your resilience, and move the entire organisation forward with ISMS.online.

Book a demo



Frequently Asked Questions

Who exactly is covered by NIS 2-and how do you determine your regulatory risk zone?

NIS 2 extends its reach across Europe’s critical infrastructure, digital, and service sectors, rapidly pulling more organisations into its compliance orbit-often without warning. If your company operates in energy, water, health, transport, digital/cloud/IT (even at modest scale), logistics, food production, manufacturing, or public administration, you are either directly or potentially in scope. Any business over 250 staff or €50 million turnover in key sectors is instantly classified as an “essential entity,” while crossing 50 staff or €10 million turnover in “important” sectors can drag you into mandatory compliance. Crucially, even companies outside these thresholds may fall under NIS 2 if they are a vital supplier to a regulated customer-sector and client mapping now matter as much as size.

Many digital and cloud providers, and all public bodies in scope sectors, face zero threshold: they are in scope regardless of turnover or headcount. Regulatory boundaries shift quickly with new contracts, acquisitions, or a key customer’s compliance status, making static self-assessment risky. The only viable path is a live, board-reviewed map of your operations, suppliers, customers, and growth plans against NIS 2 Annex I & II-updated at every major business change, not once a year.

Regulatory surprises most often strike after a strategic deal, onboarding a high-profile client, or an overlooked digital service line.

At-a-Glance: NIS 2 Exposure Matrix

Entity or Sector Staff/Turnover NIS 2 Status
Energy, Water, Health, Transport >250 staff/€50m+ Essential entity
Digital/Cloud/IT Providers Any size Typically always in scope
Logistics, Manufacturing, Food >50 staff/€10m+ Important entity
Public Administration Any size In scope

Board and management must treat sector mapping and supply chain inventory as high-frequency disciplines. Waiting for contractual or regulatory notification is no longer acceptable-proactive, real-time mapping is now an executive responsibility.


What are the most critical new NIS 2 obligations-and why does board accountability take centre stage?

NIS 2 marks a sharp break from checkbox compliance. It requires security, resilience, and supply chain controls to be proven in real time-with digital evidence and ongoing executive oversight at the heart of enforcement.

Key obligations now include:

  • Digitally managed ISMS and risk registers: Your information security management system, policies, and risks must reflect your genuine operating environment-with board-reviewed updates, not recycled templates.
  • Scheduled, logged board and management reviews: Signatures, attendance, and decisions must be documented; unsigned, lapsed, or skipped reviews expose individual directors to personal liability.
  • Scenario-tested incident and business continuity plans: Policies must cover both 24-hour and 72-hour regulator reporting windows, and you must show evidence of testing, not just a written plan.
  • Continuous supply chain due diligence: Supplier criticality reviews, contractual controls for breach notification and audit rights, and routine refresh cycles-all digitally tracked, not annual box-ticks.
  • Comprehensive logs and digital evidence: All actions-staff training completion, risk decisions, policy sign-offs, supplier vetting-must be instantly retrievable for an audit or breach investigation.

Boards, C-suite, and directors are now personally responsible for ensuring that compliance is both real and provable. Inadequate reviews, out-of-date policies, or missing evidence can land individuals on public registers, suspend executives, and trigger punitive fines.

NIS 2 Demand How It’s Demonstrated ISO 27001 Mapping
Living ISMS & Risks Digital audit logs, sign-offs A.5.4, A.8.2, A.5.2
Board Accountability Review minutes, e-signatures Cl.9.3
Incident/BCR Testing Timestamped scenario records A.5.24–A.5.28

Static “compliance snapshots” are obsolete. Ongoing, logged involvement from leadership is now the standard that regulators expect and enforce.


What enforcement actions, penalties, and exposure are triggered under NIS 2-and where do most companies get caught out?

NIS 2 changes the stakes from theoretical to real: financial, legal, and reputational consequences are personal and public. Essential entities face fines up to €10 million or 2% of global turnover, while important entities are liable for up to €7 million or 1.4%. More critically, directors can face personal sanctions, suspensions, or appear on public non-compliance registers.

Most regulatory actions are triggered by:

  • Missed incident reporting: Failing to notify within 24 or 72 hours-sometimes for a suspected, not confirmed, breach-sparks immediate audit and enforcement.
  • Outdated, generic, or unsigned ISMS and risk registers: “Template” or lapsed documents are classic red flags for auditors.
  • Supply chain failures: If a critical supplier or cloud provider exposes your organisation, and you lack robust, documented due diligence and contract controls, accountability transfers back to you.
  • Lack of digital evidence: Verbal assurances or “paper-only” proofs are dismissed; full electronic logs are now the audit baseline.
  • Ignoring previous regulatory findings: Failure to update controls, processes, or evidence after prior sector incidents is rapidly penalised.

Enforcement is now a digital sport-regulators demand live evidence chains, not bookshelf artefacts.

Trigger Regulator Response Consequence
Missed breach reporting Audit/investigation Fines, public register
Supplier failure Chain investigation Customer liability, sanctions
Board disengagement Director suspension Personal/professional loss

In today’s regulatory landscape, every gap in board activity, supplier oversight, or incomplete log is a potential enforcement event.


What does “digital-first” NIS 2 compliance look like-and how do you prove you’re truly audit-ready?

Operational audit readiness requires a living system underpinning your compliance-always up-to-date and instantly provable, never a static set of folders.

Critical actions for digital-first compliance:

  1. Assign and log board, executive, and role responsibilities: Every review, risk acceptance, and officer change must be timestamped and digitally logged.
  2. Cross-map all controls and registers: Overlay NIS 2 against ISO 27001, DORA, GDPR, and other internal obligations to avoid silos and reduce redundant effort.
  3. Go paperless: Store risk, supplier, incident, policy, training, and review logs centrally; spreadsheets and binders create audit blindspots.
  4. Link evidence from action to outcome: Staff learning completions, risk scenario drills, incident tests, and management reviews must be traceable from start to finish-real logs, not summaries.
  5. Scenario document and test: Rehearse 24/72-hour incident response with full records, not just policy shelf space.

Modern ISMS platforms like ISMS.online automate evidence collection, orchestrate board and supplier reviews, run policy versioning, and generate digital audit trails at every step-reducing both regulatory risk and management workload.

Event Required Evidence Example Digital Audit Log
Staff Departure Access change, log extract HR system / exit workflow export
Supplier breach Review/mitigation log Signed meeting minutes, timeline
Missed review Escalation, digital flag Alert in ISMS dashboard

This approach gives board and management confidence in facing any auditor, regulator, or customer-knowing every action is recorded, recoverable, and defensible.


Where does NIS 2 overlap with GDPR, DORA, and ISO standards-and how can you automate compliance across multiple frameworks?

NIS 2 did not arrive in a regulatory vacuum; most affected entities already operate under GDPR (privacy), DORA (finance), and ISO 27001 (security). The only way to avoid duplicated work and regulatory trapdoors is to use integrated mapping and digital dashboards.

  • GDPR: NIS 2 may trigger incident reporting within 24 hours-so systems must log both timelines, harmonise evidence, and avoid missed notifications.
  • DORA: Certain financial/ICT events are covered by DORA, but all IT/cyber risk management controls run in parallel under NIS 2.
  • ISO 27001: Best-practise and compliance structure, mapped as the control baseline for NIS 2, GDPR, and others.
  • Strategy: Central ISMS dashboards cross-tag every risk, control, and evidence string to all relevant frameworks. Update evidence once, report many times, and ensure logs are instantly filterable by standard, contract, or regulatory demand.
Framework Overlap Example Synergy Opportunity
GDPR Incident reports (72h) Dual notification, shared log
DORA Risk & ops resilience Cross-mapped controls, no duplicates
ISO 27001 ISMS structure Evidence reuse, continuous audit

Regression in one area can trigger exposure across all frameworks. Maintaining cross-framework mapping and digital evidence flow is now standard executive practise.


How does NIS 2 redefine supply chain, contract, and third-party risk-and what must you evidence to auditors and regulators?

NIS 2’s supply chain provisions call for active, ongoing, and digital risk management-not just onboarding documentation or annual review. With over 40% of NIS 2 enforcement relating to third-party or supplier failures, regulators want to see robust evidence at every step.

New requirements:

  • Continuous supplier classification and review: Maintain a live, digital inventory-with historic risk rating logs, scenario assessments, and contract change history.
  • Stronger contract clauses (notification, audit rights): Standard Ts&Cs do not suffice; explicit breach, escalations, and data access provisions are required and must be auditable.
  • Scenario testing and remediation cycles: Regularly test how supplier weaknesses could impact your own compliance-record findings, actions, and outcomes.
  • Integration with your own risk regime: Supplier reviews should update your corporate risk maps, not sit on the shelf.

ENISA, national CSIRTs, and sector groups frequently update model clauses, assurance checklists, and exercise blueprints-adopting and referencing these is no longer optional in a regulator’s eyes.

Supply Chain Control Evidence Type Best-Practise Expectation
Inventory/Classification Digital supplier register Updated at every contract event
Contract Assurance Signed, auditable logs Clause update, breach tested
Scenario Test/Drill Exercise records Action-tracking, feedback, review

Every supplier is now a compliance risk. Automating pipeline reviews, contract lifecycle logs, and scenario exercises is essential for resilience.


Which resources and continuous improvement habits will secure NIS 2 compliance as it evolves?

NIS 2 compliance must become part of your operational DNA, not an annual project. Adaptive, resilient organisations:

  • Tap into ENISA and national guidance: Regularly pull updated checklists, sector bulletins, and best-practise exercises into your ISMS.
  • Capture and log every “lesson learned”: From near-misses to actual incidents, every review generates an action-the digital register becomes a compliance asset.
  • Refresh and version all controls, roles, and contacts: Scheduled audits of policies, supplier contracts, and staff roles-documented with e-signatures and timestamped logs-are required, not just recommended.
  • Automate reminders and regulatory newsfeeds: Platforms like ISMS.online ensure role reviews, supplier check-ins, and policy updates fire on schedule, reducing “forgotten” risk exposures.
Continuous Improvement Digital Evidence Regulator Standard
Exercise/Drill Reports Session record, feedback Evidence of learning and action
Policy/Role Reassignment Version log, signature Recency and accountability clear
Lessons-Learned Register Action plan updates Demonstrates a living ISMS

Stagnation breeds risk. Regulators review your ability to anticipate, adapt, and improve as seriously as your incident reporting record.


How can you turn NIS 2 compliance from burden to business leadership in 2024?

Compliance is fast becoming the root of business value and operational trust, not just risk avoidance. Accelerate your advantage by:

  • Embedding a real-time, ISO 27001-backed ISMS that cross-maps controls and logs to every NIS 2 requirement and audit demand.
  • Automating digital evidence capture across board reviews, policy change, incident response, and supplier diligence cycles-no lost trails or ambiguous signatures.
  • Surfacing continuous improvement and resilience leadership through dashboards that combine compliance health, audit transparency, and role accountability.
  • Equipping your board and execs with living evidence-building a “compliance asset” that protects directors, reassures customers, and unlocks critical deals.

Instead of fearing each regulatory shift, become the organisation known for always being ready. Every compliance action becomes proof of resilience and a lever for trust in high-stakes partnerships.

The best-run businesses treat compliance as a continuous asset-turning audit-readiness, board accountability, and supply chain control into undeniable proof of resilience and leadership.

Ready to set a new standard? Begin with a risk-prioritised readiness check, digitise your compliance workflows, and embed accountability at every level with ISMS.online. Your business will earn trust, defend board reputations, and stay always audit-ready-no matter how the NIS 2 landscape evolves.



Mark Sharron

Mark Sharron leads Search & Generative AI Strategy at ISMS.online. His focus is communicating how ISO 27001, ISO 42001 and SOC 2 work in practice - tying risk to controls, policies and evidence with audit-ready traceability. Mark partners with product and customer teams so this logic is embedded in workflows and web content - helping organisations understand, prove security, privacy and AI governance with confidence.

Take a virtual tour

Start your free 2-minute interactive demo now and see
ISMS.online in action!

platform dashboard full on crystal

We’re a Leader in our Field

4/5 Stars
Users Love Us
Leader - Fall 2025
High Performer, Small Business - Fall 2025 UK
Regional Leader - Fall 2025 Europe
Regional Leader - Fall 2025 EMEA
Regional Leader - Fall 2025 UK
High Performer - Fall 2025 Europe Mid-market

"ISMS.Online, Outstanding tool for Regulatory Compliance"

— Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

— Karen C.

"Innovative solution to managing ISO and other accreditations"

— Ben H.