Data is valuable and can be legally sensitive.
Encryption, who needs it?
What needs encrypting?
File-level encryption has a role to play too. “We attach files to emails, copy data to USB sticks and pass them around – there are lots of ways to share data, and as end users we do it instinctively,” “For example, let’s say you copy an Excel spreadsheet from work onto my USB stick so I can work on it at home. A USB stick is easy to lose – you pull your keys out of your pocket and the USB stick falls out. As far as the law is concerned, if someone can pick up that USB stick and potentially make use of the data contained on it, that’s a data breach. It’s the same type of situation if you’re storing potentially secret or proprietary information on Dropbox, because you don’t know who might access it.”