Our security strategy involves multiple layers to protect sensitive information. Utilizing government level encryption, robust network boundaries, access controls including role driven access, and other best practices, we are working to ensure data is protected at rest and in transmission.
Security threats change constantly, so we are always evaluating and evolving our system and processes for improvements and vulnerabilities.
We do not share or sell personal information with any third-party organizations. Read our full policy here.