…How we protect your data What data breach procedures we have in place What third parties we receive data from What automated decision making and/or profiling we do with user…