Appropriate encryption of stored data;</li> </ul> <p> <strong>6.3</strong> : We will use appropriate security measures when destroying user's personal information such as shredding printed documents or securely erasing digital information.</p> <p> <strong>6.4</strong> : We will continually review and update our security policies and controls as technology changes to ensure ongoing personal information security.</p>Policy 7 – Providing Users Access to Personal Information <p> <strong>7.1</strong> :