Oh, good - they're "algorithmically constrained".
I was worried for a minute there...
It would be impossible to “algorithmically constrain” something without decrypting it first. As such, decrypting the data is a violation of 4th amendment protections unless the person willingly gave up a certificate, password, private key, hash, etc. Once it’s open, the data therein is fair game.
This is like saying that the police can’t arrest you for the dead bodies in your living room because the warrant says they were there to confiscate drug paraphrenalia.