These databases are stored on dedicated, secured servers, and have appropriate information security controls in place. All network access to these databases is secured over encryption (HTTPS for web-based access, SSL for shell-based access etc).</p> <p>