Your company/organization’s pledge: We are proud to implement or continue to offer end-to-end or user-controlled encryption for our users.
Signing companies need not use end-to-end encryption or user-controlled encryption in all of their products and services, however they must either:
– Already offer end-to-end encryption or user-controlled encryption on at least one product or service that their company provides; or
– Have previously announced, or will announce on Global Encryption Day, its commitment to offering end-to-end encryption or user-controlled encryption on at least one product or service that its company provides.
End-to-end encryption is any form of encryption in which only the sender and intended recipient can read the message. End-to-end encryption applies specifically to two or multi-party communications. For data at rest, a defining factor is control over the keys or the ability to decrypt the user’s data. User-controlled encryption, like end-to-end encryption, gives the end user sole control over the secret keys needed to recover data – including data at rest. For both end-to-end encryption and user-controlled encryption, no third party, even the party providing the device or the service, has knowledge of the encryption key or can decrypt the encrypted content.