When an email is sent, the HSM generates a unique encryption key to encrypt the email content. The encrypted email is then transmitted to the recipient, who uses a corresponding decryption key managed by an HSM to decrypt the email. This process ensures that only authorized parties can read the email content.