A method and system for supplementing and / or replacing current security protocols and / or mechanisms used to store, manage and / or disseminate information for use on private data management devices and / or a private network and / or public network access provider's network. The system includes processing hardware, proprietary software, and firmware. The system protects private data without the need to trust the security or veracity of third parties and / or intermediate computers and / or networks. When a “user” stores data it is immediately protected from active and passive compromise attempts. Once protected and stored, data is never released and / or transferred unprotected. Only the authorized “receiver” of the data is capable of accessing the protected data. Encryption is used to enhance authentication of the participants and / or protection of the data. This method can be used in conjunction with other secure data transfer applications such as, but not limited to, Secure Socket Layer (SSL) encryption and / or the Secure Electronic Transaction (SET) protocol, etc. This method can also be used in conjunction with any data transfer mechanism such as, but not limited to, Ethernet, WiFi, Bluetooth, RFID transponders, etc.