personnel need to realize their job in retaining the safety of encrypted data, including how to deal with encryption keys, use protected authentication, and stick to suitable data dealing with processes. In selected situations, the use of automatic technologies to the dissemination of content material can even have a significant impact on the righ