data management encrypted policy database data management authentication computer encryption agent electronics recovery encryption computers security decryption key management laptops analysis cryptography