. . . . "We use encryption, firewalls, and other technology and security procedures to help protect the accuracy and security of your personal information and prevent unauthorized access or improper use." .