All data is stored on client's device. Only hash-data is provided to the services.
How are verification data secured from a third party access?
We did the following:
1) Personal information is protected by encryption and biometric data
2) Data is hosted on user’s device
3) User is able to chose information provided to service
4) Document verification with digital sign
Our security system was designed by internationally acclaimed security experts, so we take this question very seriously
How to Secure your MyEtherwallet Security/Private Key/Keystore File - https://www.youtube.com/watch?v=NhdOzHrSzR8