We rely on comprehensive procedures for risk identification and assessment, particularly for cloud services. All necessary measures to protect the integrity, confidentiality, and availability of data are consistently implemented, including strict access controls. Encryption of sensitive data during transmission and storage, as well as physical and virtual security measures, help protect our data and IT infrastructure. Regular security assessments and vulnerability analyses enable continuous improvement of our cloud security.