That way, if they need it as proof, they can just decrypt the data set. But if the data is stolen, it is of no use for the attacker.
That way, if they need it as proof, they can just decrypt the data set. But if the data is stolen, it is of no use for the attacker.