Provided are a method, system and article of manufacture, wherein a request to access data is received from a requestor. A determination is made as to whether the requestor is authorized to access the data. In response to determining that the requestor is authorized to access the data, a determination is made as to whether the data is encrypted. An encryption key is requested from the requester, in response to determining that the data is not encrypted.

 
Web www.patentalert.com

< Method and computer program product for identifying or managing vulnerabilities within a data processing network

< Protocol agnostic request response pattern

> Application programming interface techniques for accessing operating system resources

> Color animated image for a portion of a display screen

~ 00619