Where appropriate, we use encryption, firewalls, access controls, passwords, and/or physical security measures to protect the personal information we collect and maintain about you against unauthorized access and disclosure. Our databases and emails are hosted in data centers which offer state of the art physical security. Where any user data is concerned we use encryption in line with industry standards or better.