Does the company clearly disclose that it deploys advanced authentication methods to prevent fraudulent access?