. . "We take reasonable steps to protect Personal Information and use technology such as SSL encryption, access control procedures, firewalls and physical security." . . .