Anyone out there willing to discuss good practices to obfuscation data to meet the SOC 2 standards? Thanks * To join/leave the list, search archives, change list settings, * * etc., please visit http://raven.utc.edu/archives/hp3000-l.html *