"We use encryption when transmitting your personal information, and we employ firewalls and other technologies to help prevent unauthorized persons from gaining access to your information." . . . .