Problem: A small business business wants to share documents between employees. btSync Solution: “The IT person” installs btSync on a company computer system, creates a folder in it and gives the Full Access secret to employees and instructions for setting up btSync. Problem with btSync solution: an employee is fired. Chaos ensues as new secrets are generated, distributed, changes made to local btsync folders are lost, etc. Proposed Solution: Client software generates public/private key pair and sends the public key to a “client controller.” Client Controller responds with Full Access Secret(s) for client btSync DB(s), and Full Access Secret(s) for btSync Folders, encrypted with the client’s public key. Employees setup folder(s) and client software as operates the same as btSync currently does. Proposed Solution Implementation: “The IT person” installs “btSyncControl.” Employees install “btSyncControl” and send “Requests for Access” to “the IT person.” Using the Full Access Secret(s) for client btSync DB(s), the Client Controller(s) can monitor the status of individual folders. Before an employee is terminated, a Client Controller can send a “Wipe” instruction to that employee’s btSyncControl. Once the wipe is confirmed, the employee is informed of the news. An advantage of this solution is that Full Access Secrets can be securely be sent over insecure networks. Issues with proposed solution: Employees can copy files to non btSyncControl folders. They could do this with most solutions. Folder Full Access Keys will reside on employee machines. The keys could be changed with an extension to this protocol. Although, it is unlikely that “most” employees will attempt to extract the Full Access Key secrets before they are fired.