> What they should say is, they will never transfer the unencrypted data to a third party, and will never enable a third party with the encrypted data to decrypt it.
Doesn't really work... they can send the encrypted data to Y and the encryption key to Z so that Y and Z can make their own agreements.
Doesn't really work... they can send the encrypted data to Y and the encryption key to Z so that Y and Z can make their own agreements.