This section explains how we use and defend sensitive data