Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

RETAIN: The application business sensitive data will be retained on encryption algorithm/policy activation flag change.

DESTROY: The application business sensitive data will be destroyed on encryption algorithm/policy activation flag change.

DESTROY_ON_SECURITY_BREACH: can be initiated by the user, on compromised device detection or, by

...