Close-to-close encryption: Messages are securely transmitted with the sender towards the recipient working with potent encryption tools, making it challenging for unauthorized functions to intercept and obtain PHI.The platforms can even be accustomed to remotely retract and delete messages if a cellular unit is lost or stolen, PIN-lock applications