1. The Database is encrypted.
2. All operations with the data are performed in encrypted form at all times.
3. Internal employees and external partners interact with the encrypted data without having direct access to the data itself. They can only send queries within their permissions and receive the resulting responses.