Secured information is stored on a server accessible to a network. A first
access component that is required to permit use of the secured
information is distributed to a delegate. In the absence of a second
access component, the first access component is not sufficient to permit
use of the secured information. The second access component can be stored
on the server or stored with a third party for distribution to the
delegate.