When necessary, we will use strong cryptographic algorithms to protect all public and private keys and passwords. All of these appropriate security measures are taken for protecting information against unauthorized access, unauthorized alteration, destruction or data leakage.