Hi -

The security folks here at Lincoln are wondering what protocols we use
for encryption -
in those instances when we encrypt audio and video.  Can anyone tell
me - or point me
to the appropriate document?

Many thanks,

   Julie

Reply via email to