When you install an SSL certificate on a web server, it typically applies *at least* domain wide. It would be a parculiar scenario for the SSL certificate to not be applied to an entire domain, and just specific pages.
There are also "wildcard" certificates, which can be applied to any number of sub domains as well, but these are typically more expensive. (ex: one.domain.com, two.domain.com, three.domain.com all covered by a single *.domain.com wildcard SSL certificate)
Installing an SSL certificate only protects the data as it goes 'over the wire" from being snooped upon. SSL does not necessarily protect you from form spam, cross-site scripting attackes, etc. Those latter methods need to be handled at the programing / application level most typically, or through some sort of web security proxy or server configuration.
You might start with researching cross-site scripting and cross site forgery attack methods. Here are two links to get you started:
http://en.wikipedia.org/wiki/Cross-site_request_forgeryhttp://en.wikipedia.org/wiki/Cross_site_scriptingYou might also considering posting a question on EE on how to better secure your forms from spamming, etc, and post it in a topic specific to the type of web language you are using.
If the e-mail is sent through the internet as unencrypted clear text, it can be read by any of the servers and other computers on the network path it travels through to get to its destination. The old analogy is that this is equivalent to sending a postcard. Anyone who touches or is in close enough vicinity can read the message contents.
While I'm not familiar with the company who sponsored this white-paper, the details should give you some good additional information:
http://www.slideshare.net/Echoworx/critical-need-for-encrypted-email-and-file-transfer-solutions