In mail, the system relies on the IMAP and SMTP protocols that happen to be standardized and very well described. Within the protected enclave we parse all incoming and outgoing request (to and through the Delegatee) and Examine them against access plan defined by the credential Owner. take into account, being a concrete state of affairs, the organ