Where encryption is used, does the system use industry recognized strong encryption algorithms? Are there any proprietary cryptographic algorithms used in the system?
Yes, strong encryption (for passwords for data access), no proprietary encryption algorithms are used.