"in computer and software capabilities and encryption technology, new tools and other developments may increase the risk of such a breach." . . . . .