. . . "Additionally, all forms of data are capable of being secured under this process, including, but not limited to, text, video, images, biometrics and voice data." .