Data security controls which include, at a minimum, logical segregation of data, restricted (e.g. role-based) access and monitoring, and utilization of commercially available industry standard encryption technologies for Personal Data that is transmitted over public networks (i.e. the Internet) or when transmitted wirelessly or at rest or stored on portable or removable media (i.e. laptop computers, CD/DVD, USB drives, back-up tapes). All web traffic is transmitted through HTTPS TLS 1.2. Server to server calls are signed with an HMAC based protocol. Databases are encrypted with AES-256 with daily offsite backups.