Introduction to email encryption rules