The information that is stored is protected by several security measures, such as firewalls, encryption of the connections and user authentication. The systems that contain personal data are regularly updated with security updates for well-known security flaws.
Application logs are stored for 20 days, but can in exceptional cases be stored for a longer period if a log is needed in relation to troubleshooting etc.