This document addresses the data flow and security practices for safeguarding the Personally Identifiable Information (PII) and Personal Health Information (PHI) utilized by the Dell SonicWALL Email Compliance and Encryption cloud service.
The example outlined uses an email from a Dell SonicWALL user as an example of a sending client. It covers the encryption algorithms used by the cloud encryption service, the stored procedures that govern access control on the encrypted database, and explains how encryption keys are managed by the cloud encryption service.
It also describes mitigating risks and quality assurance procedures that enforce these measures. For simplicity sake, a number of assumptions have been made concerning connection and delivery options. Please do not assume these are the only ways the cloud encryption service can handle data.
The cloud encryption service has been maturing for over 14 years, and contains numerous configuration options to accommodate most any scenario.











