We use various security measures to protect the information we collect, as appropriate to the type of information, including encryption, firewalls, and access controls. We store information you provide to us on a computer system located in a controlled facility with a limited access.