There are breach stories associated with print-outs thrown in the garbage, 
where the print-outs contain sensitive information.
We do not live in a paperless office.  Everyone needs a printer ... 
everyone does screen prints, everyone gets reports, some people get their 
output in the form of some file extracted from the 400 data, going into say 
an XL or other format.  There would need to be a programming standard that 
any report, any screen, that is showing sensitive data, that has been 
converted from encrypted form for the benefit of the user, states in a 
standard location that it contains that sensitive data, like on page 
headers we now put date time who name of report page # etc. well also add 
some phrase like "top secret" or "shred when done with" and combine this 
with inter-company personnel rules for the handling and storage of any such 
report containing such sensitive data.
Whatever standard the company comes up with, there needs to be vigorous 
auditing to make sure the new policies are being adhered to, and exceptions 
authorized by top managers are appropriately documented.
You might start with the payroll system as a model.
Does the HR clerk have access to a paper shredder?
What goes into his or her waste paper basket unshredded?
How can he/she tell difference between confidential and non-confidential data?
Are file cabinets, that contain confidential material, properly marked so 
that when that office gets closed, the contents do not end up in dumpster, 
without first going through a shredder?
Company personnel habitually send to contacts in other companies a myriad 
of copies of our internal reports, because they contain info we want to 
give to the other companies.  This practice needs a review, since now some 
of that data is sensitive and should not be shared without some kind of 
contract in place for the new reciipent of the data to protect it as 
carefully as the original possessor supposed to.
>The boss wants a simple list sorted by encrypted
>field with specific other requirements.  This
>happens a lot at here in the office, and I was
>wondering how query or SQL access to those
>encrypted fields is impacted.
I'm starting to work with the encryption functions, and the first thing I
wonder about is if the data is sensitive enough to encrypt, do you really
want to print it on a bunch of reports?  Will you be logging who runs the
reports, and ensure that all of those reports are properly destroyed?
While you can key a file on an encrypted field, there would be no way to
predict the order of keys in that file. For instance the encrypted value
of account 567 may place it before the encrypted value of account 123.
Steven Morrison
Fidelity Express
903-885-1283  ext. 479
As an Amazon Associate we earn from qualifying purchases.