This content has been marked as final. Show 2 replies
You need to provide more information than that.
When an authorized user queries an encrypted column they get the unencrypted data.
So the only way you could be getting encrypted data is by a query from an unauthorized user.
Which raises the question as to why an unauthorized user is querying encrypted data to begin with.