This lot is generally related to secure data transfer. Techniques are disclosed to transfer secured electronic data by inserting an encrypted set of instructions with the data. The set of instructions are executed at the receiver end to view the message. Also disclosed executing various operations such as deleting content, informing unintended user identity to security providers, deleting files or removing message from actual receivers’ account, if an unauthorized person tries to access the data. Further disclosed deleting electronic communication if not accessed within a pre-determined time. The technology may be implemented in emails, online transactions, coupons, secure electronic communications, secure e-document transfer, chats, etc.