Articles

Security Policy

Data protection

  • Leading technologies including encryption software is used to protect data and adherence to strict security standards are maintained to prevent unauthorized access.

Storage security

  • All electronic storage and transmission of personal data are secured and stored with appropriate security technologies.