These protocols will help protect users information and assets even in the event of a hacking or breach. (knowtechie.com)
In addition, we employ a number of physical and electronic security measures to protect user information from unauthorized access. (lawyerist.com)
Although Zuckerberg talked a lot about protecting user information, he did not mention why Facebook overlooked the potential problems inherent in giving developers such broad access to user data in the first place. (fortune.com)