Information is protected through a series of security measures. Each user account requires username/password credentials to log in. A security certificate is used to encrypt the data. Various other system features are in place to secure the data, which is hosted at a U.S. based data center that surpasses industry standards for reliability and network protection.