508 Compliance, AS/400 compliance, Audit and compliance, Auditing (compliance), Business Intelligence for Compliance, Check for License Compliance, Compliance Assessment, Compliance checklist, compliance management, Compliance mapping, Compliance process, Compliance products, Dodd-Frank, E-discovery, EU directive 95/46, Financial industry, Financial regulations, Governance, Governance Risk and Compliance, grc, GRC program, GRC software, HIPAA Compliance, HIPAA regulations, HIPPA Compliance, Information security governance, IT Compliance, IT Governance, Laws, Lawsuits, PCI, PCI compliance, PCI Compliance and Acquisitions, PCI DSS compliance, Privacy rights, Project governance, Regulations, regulatory compliance, Risk mitigation, Sarbanes-Oxley, Sarbanes-Oxley Act, SEC Compliance, Security compliance, SOX, SOX 404, SOX checklist, SOX compliance, standards, Virtualization compliance, windows 7 compliance VIEW ALL TAGS
Should encryption be explicitly proscribed in Data Security and Provacy legislation like the Massachusetts Data Prvacy Law and the White House cybersecurity initiative? If so, what strength or method? Should there be a minimum strength? What do you think?