5.Forced Encriptation