"appropriate keys, algorithms or other information are in place for use by" . . . .