All electronic storage and transmission of personally identifiable information is secured with appropriate security technologies. Reasonable steps will be taken to securely destroy or permanently de-identify your information when it is no longer needed.