At no time does anyone from the outside world have access to the Credit Union’s database via the Internet. Any and all request for data must pass through two distinct validation and control centers. Each request and answer is logged at each stop through the firewall. Additionally, any suspicious activity is logged and causes an alarm