"Consequently, unauthorized parties may overcome our encryption and security systems and obtain access to data on our network, including on a device connected to our network." . . . .