When appropriate, we will involve approved third-party professionals or data security experts to assist in the maintenance of these systems.</p> <p> <br> For specialized data-related processes, we only use approved suppliers who have been selected for their ability to complete the assigned work securely and safely. We hold these suppliers to the same standards to which we hold ourselves and we maintain records of their processing activities.</p> <p> <u>