When the app completes its operation on the data, any data that has been modified is re-encrypted and re-packaged with its original access control and usage policies, before being written back to storage or transferred to another machine.
When the app completes its operation on the data, any data that has been modified is re-encrypted and re-packaged with its original access control and usage policies, before being written back to storage or transferred to another machine.