Unauthorized entry or use, hardware or software failure, and other factors may compromise the security of user information at any time.</p> <p>It is your responsibility to take appropriate steps to protect against unauthorized access to your computer or mobile device.