Restrictions to Replicating Encrypted Columns

The second bulleted item in “Replicating encrypted columns” in Chapter 9, “Managing Replicated Tables” is incorrect.

Replace with: