Answer: key escrow
Step-by-step explanation:
using key escrow technique users can recover encrypted data if users forget their passphrase or if the user key is corrupted. The concept here is that those keys are held in an escrow meaning a bond or a document so that it could be accessed via a third party in case of system failure.