While listening to Laura's presentation on DB PROCs for security and encryption, I was reminded of this: