Encryption technologies are utilized to ensure the confidentiality and integrity of Data at rest and in transit. d. Active security monitoring is employed within our physical infrastructure We actively monitor the security of our database but may need to rely on our partners and trade affiliates to notify us of any data breaches. <p>