. . . "Encryption and other scrambling techniques are frequently used to protect data from unauthorized access." .