To protect your data in our internal networks and systems, we use technology such as firewalls, authentication, proxies, monitoring technology, and on-going human tracking of network traffic and load to track potentially abusing activity in our network.