How are you planning on protecting user information from hacking attempts?
We did the following:
1) Personal information is protected by encryption and biometric data
2) Data is hosted on users device
3) User is able to chose information provided to service
4) Document verification with digital sign