Communication is protected with an encryption algorithm. Alternatively, objects may be encrypted. Digital signatures can verify the content.
Data privacy actions include encrypt, decrypt, sign, and verify.