A method used to convert data (in the form of passwords, files, or emails) into an illegible format if intercepted or accessed without the correct Encryption Key. The Key is a pass phrase set by the user encrypting the data before it is stored/sent online, with the encryption software performing complex mathematical operations on the data.