Hi - The security folks here at Lincoln are wondering what protocols we use for encryption - in those instances when we encrypt audio and video. Can anyone tell me - or point me to the appropriate document? Many thanks, Julie