Mechanisms exist to prevent encrypted data from bypassing content-checking mechanisms.
Does the organization prevent encrypted data from bypassing content-checking mechanisms?