<br>Security <p>TechnologyAdvice works hard to protect Information You provide from loss, misuse, and unauthorized access or disclosure. These steps take into account the sensitivity of the Other Information we collect, process and store, and the current state of technology. TechnologyAdvice has deployed all of these requirements in our systems and processes both internally as well as with upstream data providers to ensure the security of Personal Information:</p> <ul> <li>Hardware-level and/or software-level encryption</li> <li>Data minimization</li> <li>Data pseudonymization</li> <li>Data encryption at rest</li> <li>Data encryption in transit</li> </ul>