We use appropriate physical, technical, and organizational security safeguards to help protect your info from unauthorized access, use, or disclosure both during transmission and in storage. For example, we use computer systems with limited access in controlled facilities to store info. We also use technologies like encryption and hashing to protect some of the info we collect. </p> <p>