End-to-end encryption

Control access

Someone encrypts data so it can only be decrypted by the intended person. This often uses public key cryptography.