You can perform and manage encrypted column audits.
See Auditing in the Security Administration Guide.