. . . "For example, if B was a patent attorney, B might accept secure email only from trusted sources, such as current customers of the firm." . . .