. . "A range of protective systems and software is used, including encryption technology, firewall and a backup system." . . .