. . . "sophisticated counter-measures and it is possible that third parties, such as hackers or criminal organizations, may unlawfully gain access to information provided by our users to us through our" .