All transferred data is encrypted using an AES-256 encryption algorithm. Access is protected by a unique encryption key held only by the company, and its use is essential for any data recovery.