data cryptography encrypted policy data management database recovery management laptops analysis encryption computers electronics authentication computer decryption key management security