[text_output]Leading technologies including encryption software is used to protect data and adherence to strict safety standards are maintained to prevent unauthorized access.
All electronic storage and transmission of personal data are secured and stored with appropriate security technologies.[/text_output]