The process of transforming processing information to make it unusable to anyone except those possessing special knowledge, usually referred to as a key.
Thank you for applying with ATHC. Further instructions are sent by email. Please be sure to check your spam folder if the email is not received promptly.