. . . "We use leading technologies such as data encryption, firewalls, server authentication, and digital certificates to protect the security of your data." . .