The solution requires storage of encryption keys — the codes needed to decrypt data — with third-party custodians. Those custodians would not keep these client’s encryption keys. Rather, they give the ...