"If the network doesn???t use encryption, a thief can use software that allows them to access your data as it is transmitted over the network, including passwords and sensitive identity information." . . . .