Security Policy

 

  • Data Protection

Leading technologies including encryption software is used to protect data and adhering to strict security standards are maintained to prevent unauthorized access.

  • Storage Security

All electronic storage and transmission of personal data are secured and stored with appropriate security technologies.