Consider the following for using cryptography: organizational policy on cryptography, identifying level of protection and classification, key management, standards, and impact on inspecting content. Adhere to regulations and nation-specific requirements, and address cross-border transfers of encrypted data. Service agreements should cover liability, reliability, and response times. Key management should involve safe protocols for key generation, distribution, storage, revocation, backup, archiving, and logging. Keep all keys from modification, loss, and unauthorized use. Consider public key authentication.