This document discusses effective strategies for deploying encryption. It emphasizes that encryption requires attention to detail, good design, and project management. It warns that many encryption roll-outs are incomplete solutions that lack proper key management, documentation, and processes. The document provides steps for developing an effective encryption strategy, including defining requirements, identifying sensitive data locations, and creating detailed implementation plans. It stresses that encryption is a process, not a product, and must be properly planned and managed.