...
RETAIN: The application business sensitive data will be retained on encryption algorithm/policy activation flag change.
DESTROY: The application business sensitive data will be destroyed on encryption algorithm/policy activation flag change.
DESTROY_ON_SECURITY_BREACH: can be initiated by the user, on compromised device detection or, by
...