Abstract: A computer-implemented method of processing data by a first processor, the data being generated by a second processor. The method comprises receiving a data object encrypted with a first encryption key, the data object comprising the data to be processed and policy data indicating allowed processing for said data. said received data object is decrypted based upon said first encryption key and the data is processed only in accordance with the policy data.