According to our company's policy we use variety of encryption technologies and security procedures to help protect our Purchase Order Database from unauthorized access or disclosure. Only our supplier and customers have access to our Purchase Order Database.