This allows the user to encrypt the data logs or the device or both.
Use Selected Key: This allows the user to use a selected key.
Generate New Key: This allows the user to generate a new key to lock the device’s data logs.
Import Key: This allows the user to import any key stored previously in the system.
Export Key: This allows the user to export the newly created key.
Delete Key: This allows the user to delete a selected key.