Copy or copies of a code, password, or secret key protected by a third party for use in an emergency or when the originals) is(are) lost. Escrowed items may be separated to two or more third parties to mitigate risk of the trusted third party abusing its power. Typically, this is a fiduciary arrangement.