How is the data transferred from the source to the destination provider? Encrypted data connections are always used as long as the source and destination provider both support this.