Will you be able to break the encryption so that you can verify that that the employee was in possession of the proprietary information?