means that the algorithm or key length may be used to process already protected information (e.g., to decrypt ciphertext data or to verify a digital signature), but there may be a risk in doing so.
Source(s):
NIST SP 800-125B