§ 28-4. Encrypted data.  


Latest version.
  • If encrypted data is compromised along with the corresponding encryption key, the data shall be considered unencrypted and thus fall under the notification requirements.