We utilize current technologies to keep your data segmented from other clients to prevent any commingling of data. Our security architecture, policies, and procedures follow IT best practices. The data is encrypted with the same technologies that are implemented by financial institutions.