Case Project 5-1: Configuring Encryption in Word 2010
The chief information officer (CIO) in your organization has expressed concerns about the use of encryption by employees. Currently, users encrypt Microsoft Word documents using the built-in encryption function. The CIO has been considering a third-party cryptographic product, but needs more information about how Word encryption works before she can make an informed decision.
You have been asked to write a two-page report that explains the extent to which the IT department can configure the cryptographic features of Word 2010. What is the process involved in configuring encryption?