logo apply

Security Policy

Data Protection

title bottom left

The latest technologies including data encryption are used to protect the data submitted and adherence to strict security standards is applied to prevent unauthorized access.

 

Storage Security

title bottom left

All electronic storage and transmission of personal data will be protected and stored using appropriate security technology.