AMI recommends that you encrypt sensitive information to protect it from being viewed by unintended recipients. AMI can exchange emails with you using encryption. AMI highly suggests that you encrypt and decrypt email communications between AMI and yourself using an email client that supports encryption.
It is good security practice that you only trust validated encryption keys. Do not trust encryption keys that have not been validated. It is important to also validate your copy of the AMI public encryption key to ensure it is legitimate.