. . "Issues such as deployment, recovery of encrypted data when an employee leaves or loses their key, and ease of use to a very broad audience where there is no consistency in skill levels, are critically important." . .