9.23

What are two advantages of encrypting data stored in the database?