This part explains how we use and shield delicate information