The Global Standard for Secure & Certified Electronic Communications

Size: px
Start display at page:

Download "The Global Standard for Secure & Certified Electronic Communications"

Transcription

1 RPOST The Global Standard for Secure & Certified Electronic Communications SECURITY COMPLIANCE PRODUCTIVITY RPOST PRODUCT UPDATE FOR CUSTOMER December 2017

2 INTRODUCTION TO RPOST PRODUCT UPDATE... 2 RPost Service Portfolio... 2 RMail Adds Essential Features to Existing Programs... 3 RMail Makes Better for Business... 4 PRODUCT SNAPSHOTS... 6 RMail: Encryption & More... 6 RSign: E-signature Services & Automation RForms: E-Sign for Your Forms Creation Applications RShare: Secure File Share & More Registered Secure & Certified E-Delivery Proof OTP Messaging: Quantum Secure Messaging App

3 INTRODUCTION TO RPOST PRODUCT UPDATE RPost Service Portfolio RPost is a leader in secure and certified electronic communications, using by thousands of companies worldwide to enhance business security, compliance, and productivity. Most users start with RPost s RMail product, as it is an easy to install entry product within the RPost service portfolio. Once users get started with RMail, savvy users consider specialized automation opportunities and more productivity tools with RPost s RSign, RForms, RShare and Registered services. Users migrate certain types of notices, forms, communications, platforms, or users to these to further modernize their message and document processes. Each of these adds an element of specialization to the functions enabled through the RMail user provisioning (RForms, RShare, Registered ) or RSign user provisioning. All users provisioned for RMail do not need to be reprovisioned for RForms, RShare, Registered automation, but may opt to use these from different interfaces or by changing message or template formatting to automate sending from their existing business applications. RSign users need to be provisioned separately for that service if they choose to use the service more than 5 times per user per month. 2

4 RMail Adds Essential Features to Existing Programs RMail adds advanced features all-in-one. Each of these features is rated among the best in the world standalone, by analysts and industry organizations; with customers further benefiting from a more elegant user experience, and a more economical approach, with all of these features included in one app, the RMail app. Further, each feature has a variety of settings and configuration options to suit any small business or enterprise requirement, commercially off-the-shelf. Main features include: 3

5 RMail Makes Better for Business RMail empowers users inside their existing program with more productivity with security and compliance in mind. RMail provides essentials that make better for business. RMail Makes Microsoft Better Empower Office 365 and Outlook RMail Makes Gmail Better Empower Gmail and Google Apps RMail features run inside Gmail installed as a Chrome browser extension. 4

6 RMail Makes Zimbra Better for Business RMail features run inside Zimbra installed with a Zimlet that can be deployed for one company or by a Zimbra hosting company for some or all users. RMail Extends to Include RSign RMail users that would like to explore advanced e-signature automation options with rules, templates, and the ability to set a simple guided signoff process (and much more!) may themselves click the Advanced link next to the e-sign options. This auto-enrolls the user into the RSign advance web-based e-sign platform. The users may simply start using the service up to five times per user per month. 5

7 PRODUCT SNAPSHOTS RMail: Encryption & More RMail makes Microsoft better for business, adding specialized security for privacy, compliance, and to prevent targeted threats, certified e-delivery tracking and proof, secure large file sharing, and legal esignatures, all-in-one. RMail installs to run inside Microsoft Office 365 and all versions of Outlook. Specialized security -- RMail encryption automatically delivers in a unique way to each recipient, always creating the simplest user experience for the recipient while also returning auditable proof of privacy compliance to the sender; going far beyond basic TLS and without the inefficiencies of portal link-retrieval systems. o Built in imposter protection -- RMail includes unique new technology to detect targeted spearphishing, specifically designed to prevent imposter wire fraud and other lures. Certified e-delivery tracking and proof -- RMail includes Registered advanced open and delivery tracking, returning court-admissible timestamped proof of precise message content successfully delivered importantly, without requiring any action or setting by the recipient. Secure large file sharing -- With RMail, it is simple to attach up to 1Gb of files to an Outlook and send securely. RMail file sharing is perfect for security and compliance as it creates a one -time download box that eliminates the risk of inviting download recipients to be able to see the sender s cloud storage file structure, reduces risk by auto-purging files after a preset time, includes automatic encryption options, and returns proof of delivery and download. Electronic signatures -- RMail encourages e-signature use as it includes the easiest e-signature process available. Senders simply attach any document in Outlook and one-click send for recipient e-signoff. With RMail e-signatures, there is no need for the sender to set up or pre-configure the document. RMail e-signature users also receive one-click access to RSign, RPost s full-service advanced e-signature platform. RMail has been enhancing customer security, compliance and productivity for more than a decade, powered by RPost patented Registered technology. RMail runs seamlessly within users existing platforms, including all versions of Microsoft Outlook, Office 365, Outlook on the Web, Gmail, Zimbra and more, with the RMail Security Gateway as an optional add-on module. 6

8 RMail per user service plans are easy to install with a few clicks, without any adjustments to the server or network. RMail volume service plans simplify automated sending from business applications or from groups of power users. With RMail, you always send from your existing address to any recipient with no software, accounts, or downloads required on the recipient end. All EU Member Countries and the United Kingdom must comply with the General Data Protection Regulation (GDPR) requiring business to protect the privacy and security of personal data under threat of large fines. With RMail, users receive a Registered Receipt record of each transaction that may serve as auditable proof of GDPR compliance and secure delivery. In the United States, there are a variety of consumer data privacy regulations in health care and consumer finance related industries (HIPAA, GLBA, etc.). With RMail, users receive a Registered Receipt record of each transaction that may serve as auditable proof of compliance and secure delivery. QUICK GUIDE TO BENEFITS RMail is a security, compliance, and productivity bundle that runs Inside Microsoft Outlook, Gmail, Zimbra and other platforms, and adds value for important messages. RMail All-in-One Features: Encryption Compliance Certified E-Delivery Proof Open Tracking E-Signatures Secure File Share Imposter Detection, and more, all-in-one. RMail Empowers Users: Creates Visibility: desire to track opening, delivery Empowers: irrefutable proof of who said what when Secures: encryption to protect against thieves Boosts Productivity: e-sign, large file transfer inside RMail Desirable Key Attributes: Simple enough for individuals Secure enough for the largest companies Universal no recipient requirements No storage in transit by third parties All-in-One integrated offering simplifies 7

9 SERVICE PLAN DETAILS Standard Plan Features Encrypt: Easily encrypt sensitive s and attachments for security or regulatory compliance. Includes a one-click encrypted reply option for recipients. Automatically detects and delivers with the simplest user experience for each recipient and provides a toggle option to maintain encryption inside each recipient s inbox. Provides auditable proof of data privacy compliance on a message-by-message basis. Track & Prove: Track, prove and certify your important s by sending them as Registered messages. Includes timestamped proof of delivery with proof of message body and attachment content. Know precisely when your has been delivered with open tracking. E-Sign: Accelerate legally-binding signoff on documents and agreements with simple-to-use electronic signature features. Attach any document and send for recipient e-signoff, with no need to configure the document online. (See RSign for advanced online e-signature and automation services). Secure Large File Transfer: Simply attach large files and send from your compose pane. With RMail, you may attach and send large files up to hundreds of megabytes per transmission, with options to encrypt. There is no need to visit online portals to create and share folders; there is no need to invite others to have access to your main file repositories. RMail automatically creates a one-time online folder per send for each recipient to retrieve files, and auto-purges the data after a selectable period of time to optimize security and compliance. Imposter Protection: Detects and alerts for the most sophisticated spear-phishing lures; alerting users when they are about to reply to a Business Compromise (BEC) imposter . Users are protected with RMail s Anti-Whaling technology. SideNote: Insert private notes into an visible only to Cc d/bcc d recipients, to provide copied recipients with private context as to why they have been copied on the original message. Auditable Tracking and Verifiable Proof: A Registered Receipt record is automatically generated and returned to the sender with every RMail message sent, to provide the sender verifiable and auditable proof of who said what when, who agreed to what when, or fact of data privacy compliance. Business Plan Features Includes all Standard Plan features optimized for power users, plus includes an online management console. Power Users: Optimized for higher volume senders. Reporting Online: View service use volume by user, by feature, by date range, by delivery status or by message element. Custom Report Delivery: Create custom use reports and schedule automated encrypted delivery in a variety of formats. Productivity Enhancements: Adjust advanced settings such as e-sign order for signoff (i.e. sequential signing where one person has to complete the signing process before the next person is invited to signoff), form field e-sign tags, larger file transfer limits (up to 1 GB per transmission) or length of time large file transfer data remains available for recipients, and more. 8

10 Shared Volume Plan Features High Volume Senders: These plans are for organizations that have high-volume senders, automated sending from business applications, or shared workflow sending addresses. Shared Service License: These plans include all Business Plan features with a shared service license for up to the designated number of users, sending up to the designated aggregate RMail message volume (total across all users), over the designated period of time (monthly, annual, or as used). These plans automatically replenish at the end of the period or if volume has been completed, upon re-order or upgrade. Add-On: Security Gateway & Customization Security Gateway Features: The RMail Security Gateway adds policy-based encryption and much more, as an add-on for designated RMail Business Per User Plans and RMail Shared Volume Plans. The RMail Security Gateway is installed as an add-on to the customer messaging server environment such that inbound and/or outbound message traffic passes through. This adds a native content policy engine to provide data loss prevention (DLP) content inspection and automated routing of content identified messages for encrypted delivery, for Registered certified e-delivery proof, or for recipient e-signoff. Automated encryption enforcement may be triggered based on sender, recipient, tags by user (e.g., adding "Secure" or "(R)" to the subject line), data classification tags, content inspection of messages or attachments, and combinations. The RMail Security Gateway also provides market leading messaging security including anti-spam, anti-virus, anti-spyware, anti-ransomware and other threat prevention scanning on in-and-outbound traffic. Customization: Organizations that choose to have more control over the user experience may do so with an added advanced installation configuration file that permits the installer to customize defaults, user interface layout, and more than 30 other specialized user experience options. 9

11 RSign: E-signature Services & Automation RSign is the simplest to use, most affordable, full featured worldwide web-based electronic signature service. RSign makes it easy for signers to complete and sign your documents using any desktop or mobile web browser, in an intuitive, guided signing process. RSign, by RPost, includes optional encryption for privacy and patented auditable proof technology. RPost has been enhancing customer security, compliance and productivity for more than a decade. QUICK GUIDE TO BENEFITS RSign The easiest-to-use affordable service to automate sending and receiving filled and e-signed documents and forms. Prepare and send a form or document to be filled and signed electronically, always maintaining access, security, and control. Lead each signer automatically through the form or document, one input field at a time, using RSign s guided e-signing process. Configure a document and its associated workflow just once and save as a template, and you ll never have to do it again for similar transactions. View which documents have been opened and signed, increasing visibility, measuring signoff time, and speeding your business process. Receive an error-free, completed form or document back from your signer it has never been easier! Customizable Experience with Security Configurable features allow you to create your perfect sender and signer experience with document access permissions and controls, signing order, signer options, form field dependencies, re-usable templates and rule sets, group and user roles, document management, automatic reminders, reporting, security, web page signing links, encryption for compliance and privacy, ESIGN law electronic consent confirmation, and much more. Templates No matter the complexity of your document or form, RSign makes it easy to repeat similar transactions. Configure a document and its associated workflow or create form field rule sets just once as a template for one-time document preparation or for reuse with dynamic customer-filled forms. You can even share templates with other users in your group or team. Prepare Preparing your document is easy. Simply drag and drop input fields and field rules with your mouse on a webbased form editor. The prepared field rules are saved onto a copy of your uploaded document, as a rule set to apply to partially filled forms in the future, or as a template to share for reuse among your team. The saved rule 10

12 sets and templates make it easy to reuse the same document or form or simply send a one-off document for signature. Sign Getting an agreement signed is just as easy. Upload your document or choose a pre-configured template, choose your recipients, drag and drop the fields you need filled and signed, and press Send. That s it! Signers receive an with a link to view and sign the document (optionally, after they agree to your optional custom terms of service). RSign s guided signing process leads them through the entire document with a convenient progress checklist. Upon completion, a signed and authenticated copy of the document is sent to all parties, with a verifiable audit trail attached to the transaction record. Getting an error-free, completed document back from your signers has never been easier or faster. Automation and APIs Without any programming background, you can advance your team s process automation by creating a static signoff link for a pre-configured document or form template, and add the link to a web page, button, bulk/batch template, mail merge workflow, or a saved team . Anyone with this link can easily fill the form and electronically signoff according to the security levels or other rules you set. Administrators may choose to extend business applications programmatically using RSign APIs for sending documents for signature and/or managing the signed agreements. Legal Proof RSign provides extra protection for the sender with a Registered Receipt verifiable audit trail of the e-sign transaction that contains certified proof of delivery, timestamp of delivery and signoff, and proof of exact content. If needed, you have certified forensic evidence to prove your transaction happened exactly as it did, when notice was delivered, and when signed by each party. Online Management Console with Advanced Reporting RSign makes available a well laid-out online management console to adjust advanced settings, user permissions, or create and schedule custom use reports. Looking for Proof of E-Delivery of Contract Notices? To send contract notices as Registered messages with verifiable proof of e-delivery, message and attachment content, and official timestamp, explore the RMail product. Looking to Send for E-signoff from within Microsoft Outlook, Gmail, or Zimbra? For simple ways to send for e-signoff from within Microsoft Outlook, Gmail, or Zimbra, explore the RMail product. 11

13 SERVICE PLAN DETAILS Standard Plan Features Attach documents and forms and send for e-signoff Require a private access code to view and sign Create automated and scheduled reminders & notifications, with rules Attach files for signoff directly from your local drive, Google Drive, Dropbox, or Microsoft OneDrive Receive real-time delivery and signoff audit trail and history Business Plan Features Includes all features in the Standard plan, as well as encryption, templates, advanced form features, and online management console, including the following: Create, share & reuse templates Secure data privacy with encryption Create advanced rules for forms and save as templates Reuse rule sets Add field dependencies and conditional fields Store signed documents in system Receive advanced user and signoff reports on demand Set advanced roles & permissions Authenticate signer Permit recipients to add attachments as part of the signoff record Capture signoff with a finger/mouse drawn signature or typewritten signature Encrypt with auditable proof of data privacy compliance Require affirmation of custom terms or ESIGN consent language for legal compliance Shared Volume Plan Features High Volume Senders: These plans are for organizations that have high-volume senders, automated sending from business applications, or shared workflow sending addresses. Shared Service License: These plans include all Business Plan features with a shared service license for up to the designated number of users, sending up to the designated aggregate RSign message volume (total across all users), over the designated period of time (monthly, annual, or as used). These plans automatically replenish at the end of the period or if volume has been completed, upon re-order or upgrade. Add-On: Advanced Automation with API Option Plans with this add-on are for organizations that strive to automate more. These plans include options to set up static signoff links to add pre-configured forms to buttons, websites, bulk/batch s templates or mail merge workflow. The administrator may also choose to create custom e-sign consent language or terms required for acceptance prior to document signing, create a custom post-signing landing page, or add a Registered Receipt forensic transaction record. All product features are made accessible to the administrator to automate more, through connectors and APIs. RSign APIs are available to your technical team to extend your CRM, ERP, CLM or document management systems with advanced or customized RSign functionality. This is a shared service license for up to 500 users sending up to 10,000 RSign transactions in aggregate per month, replenishing monthly. The customer may upgrade this plan to an annual volume plan which can be replenished as used at any time. 12

14 RForms: E-Sign for Your Forms Creation Applications RForms is the simplest way to turn any forms creation, data import, and mail merge platform into an e-sign process. RForms makes controlling the e-signoff from any PDF or DOC form seamless with no API or integrations needed! RForms makes it easy for signers to complete and sign your forms and documents using any desktop or mobile web browser, converting the form into an e-sign enabled form automatically; placing e-signatures into designated locations on the form. QUICK GUIDE TO BENEFITS RForms The easiest-to-use affordable service to automate converting documents and forms into e-sign enabled forms; perfect for those that generate forms with business data merge applications. With no API or online form preparation needed, send a form or document to be filled and signed electronically, always maintaining access, security, and control. Each signature and text field is automatically placed in the proper location on the form. View which documents have been opened and signed, increasing visibility, measuring signoff time, and speeding your business process. Receive an error-free, completed form or document back from your signer it has never been easier! Maintain court-admissible proof of who signed what when, with the Registered Receipt audit trail and forensic record. Customize the experience with security, encryption, and legal timestamped proof of e-delivery. SERVICE PLAN DETAILS RForms services enabled with certain RMail business and shared volume plans. These are generally plans for: High Volume Senders: For organizations that have high-volume senders, automated sending from business applications, or shared workflow sending addresses. Shared Service License: For up to a designated number of users, sending up to the designated aggregate RForms message volume (total across all users), over the designated period of time. These plans automatically replenish at the end of the period or if volume has been completed, upon re-order or upgrade. Users create templates simply using existing WORD DOC or PDF forms by adding signing controls by simply making a few text adjustments to their forms and changing some advanced settings in the service administration portal. For example: a. b. In the customer administration panel, in the e-sign options, the administrator selects annotations off. Any user can thereafter simply add field tags to the document template that will be sent for signoff, to create a controlled signoff process. 13

15 c. Recipients simply add their signature in a browser pop-up after they receive the document, and the signature is placed in the proper location on the document completing the e-sign process.. The RForms service allows the sender to send their document with the option of Sign Only where the signer(s) can view and complete the signing process without annotating the contract. The sender can have the signer s information like: Name, Date, Title (optional) and Signature printed at the required location within the contract using the form field tags. Template form field tags should be used in the following format in a Microsoft Office or PDF document: Field Name Date Title Signature Tags <<Namex>> <<Datex>> <<Titlex>> <<Signaturex>> Where x is the signer s order of signing. Example: In case of two signers, the tags used within the document would be: <<Signature1>> and <<Signature2>>, and signer who signs first would have their signature printed on the location of <<Signature1>>. Form field tags may be used with: Single or Multiple signers Parallel or Sequential signing process Document locked or unlocked (annotation on/off) Example: enter the required tags on the document for the signer: 14

16 RShare: Secure File Share & More RShare file sharing is also the easiest to use secure file sharing service for businesses that need to transfer files of any size to anyone, on demand. With RShare, you simply attach files to , select reminder and security options, and send, regardless of file size. With RShare, it is simple to attach up to 1Gb of files to an Outlook and send, or send from a web browser interface. RShare file sharing is better for security and compliance as it creates a one-time download data room, auto-purges files after a set time period, includes automatic encryption options, returns proof of delivery and download, and eliminates the risk of inviting download recipients to be able to see the sender s cloud storage file structure. RShare is the easiest to send secure messages and extra-large files from a group or shared sender address with encryption and proof of delivery. RShare is included in the RMail services. RMail has been enhancing customer security, compliance and productivity for more than a decade, powered by RPost patented Registered technology. QUICK GUIDE TO BENEFITS RShare makes it easy for a group of users to send secure messages and files from one group or workflow address. As an example, certain departments may share workflow or generic accounts (i.e. billing@company.com). The RShare web interface makes it easy for a team of users to easily send from the same workflow or generic address from any web browser. Users can opt to send the message with extra-large files or no attachments at all, as Registered messages to track and prove delivery, encrypt, or set to receive recipient s e-signatures. 15

17 RShare file sharing includes important business security, compliance, and productivity features: Simple: Recipients do not need to have accounts on their end, and there is no need for recipients to login. Retention Timeframes: Sender s may set and adjust the storage duration from one day to ninety days Auto-Purge: Sender may set the timeframe when online data room will be purged, which ensures that files are not left online at active links for extended periods of time, automating compliance with data retention policies. This is an essential in highly regulated data privacy environments (Health care in the United States market for HIPAA compliance, and generally those dealing in sensitive consumer financial or health information in the United States (HIPAA & GLB privacy laws), in Europe (GDPR privacy regulations) and Canada. Encryption: Sender may choose levels of encryption, with the system automatically adapting the encrypted delivery method to ensure the simples recipient user experience, using 256-bit AES and SSL/TLS encryption. Unique, Segregated Data Room: Each transmission creates a unique data room for temporary storage of the files being transferred. This eliminates any possibility of the recipient having access to, or views of the senders file directory structures, file directory names, and other metadata that could compromise the sender data privacy or expose strategic business information. Access: Senders may enable two-factor authentication (2FA) and access controls. 16

18 Admin Console, Reminders and Reports: Sender may set timeframes to send reminders to recipients to retrieve files, and they may view activity reports, or create custom scheduled activity reports. Administrators may manage user settings and reports in an online portal. Auditable Tracking and Verifiable Proof: A Registered Receipt record is automatically generated and returned to the sender with every transmission sent, to provide the sender verifiable and auditable proof of delivery, download, and opening. Recipient Reply: Sender may permit the recipient to reply encrypted with added files. Kill Switch: Sender or sender organization may choose to kill the data room at any time, purging all stored files. Office 365 integration: For users that prefer to use RShare elegantly running within Microsoft Outlook or with advanced Registered e-delivery proof, encryption, and e-signature services included, choose RPost s RMail product. API Access: Automation is available using APIs 17

19 Registered Secure & Certified E-Delivery Proof The Registered services have been used in more than 100 countries to certify and prove delivery, content and timestamp, without requiring any compliant action at the recipient. For each message sent, the sender receives the Registered Receipt record, which is a self-contained record of proof of delivery with delivery timestamps, open tracking, proof of content delivered, and proof of encrypted delivery. The Registered Receipt has the capability to authenticate and accurately reproduce the original and attachments, including any attached disclosures, which satisfies the E-Sign Act s retention and accurate reproduction requirements. And the Registered Receipt , because it can be provided to third parties and used to authenticate the content and attachments to the , may be retained by creditors to enable access to parties entitled to access to the records for the period required by law, which satisfies the E-Sign Act s access requirements. A Registered message may be sent encrypted, or configured to record a recipient reply, signoff, or consent. QUICK GUIDE TO BENEFITS Registered Receipt is a durable, verifiable, and self-contained record of each transmission. A sender views this receipt in their program, or clicks on the Registered Receipt HTML file to view the receipt in their browser. This receipt includes an XML file, and the service includes a variety of reports, each with transmission data that may be extracted and imported into the sender s systems. This receipt s HTML file may be used by any party to authenticate the transmission data and re-construct the original content without the Registered system storing a copy of the message or transmission data. Automation and Volume Sending. All business applications (i.e. invoicing, collections, payslips, customer notifications, etc.) may be easily configured to send automated messages as Registered messages by simply adding a domain extension to each recipient address domain. To convert the message en route into an encrypted Registered message, or a message configured to record the recipient s e-signature, one simply adds a specific subject line codes to direct the Registered system to process that particular message in a special manner. Registered Receipt is an evidentiary record of high weight. There are many legal opinions in the US and Europe attesting to this receipt as a legal and verifiable record of content and timestamp delivered. Below are experts from one legal opinion related to use of the Registered Receipt as proof of e-delivery in accordance contract requirements, laws, and regulations. Evidence. The Service provides each sender of an with confirmation of delivery of the and receipt by the recipient s server, as well as the ability to reproduce the content of the original message, including any attachments. The RPost server obtains evidence of delivery and receipt of by recording communications between it and the recipient s server as each message is delivered. The Service is capable of reproducing the content of the original and attachments (including PDF files) through the use of cryptography meeting industry standards, which methods employ hash algorithms and use of encryption and encrypted hashes (digital signatures). This evidence of the delivery and receipt of an to the recipient s e- 18

20 mail server, and the ability to reproduce the original content, is provided to each sender in the form of a Registered Receipt . Delivery and Receipt Status. After the Service s attempt to deliver an , the Service provides the sender with the Registered Receipt , which provides a report that contains the delivery status of the for each recipient. This Registered Receipt will also contain two timestamps regarding the delivery and receipt of the e- mail: (1) a Proof of Delivery ( POD ) timestamp, which is the time that the reached the RPost server after the sender sent it through the Service; and (2) a Proof of Receipt ( POR ) timestamp, which is the time the recipient received the . These timestamps in the Registered Receipt indicate the applicable date and time in both Coordinated Universal Time (UTC) and local delivery times. Transmission Data. In addition to the POD and POR timestamps, the Registered Receipt includes the complete forensic transmission metadata for each recipient of an . This includes the underlying server-toserver SMTP or ESMTP conversation, including the potential for HTTP and DSN/MUA records, for each recipient destination of the . Original Content of the . In addition, this Registered Receipt contains the data that can be used to reproduce the sender s original message as it was received by the RPost server. Use of the Registered Receipt does not require that any data regarding the transaction be stored elsewhere. The entire e- mail record and authentication elements (authentication is discussed directly below) are embedded within the Registered Receipt . Authenticated with a Digital Seal. To ensure that the data represents the original content of the and transmission data, and that the data has not been tampered with, the data is encrypted and packaged with RPost s Digital Seal technology. This technology allows anyone to verify the authenticity of the content, attachments, transmission metadata, POD and POR delivery record, and POD and POR timestamps that are included in using the Registered Receipt . Verify Original without Third Party Storage. The Registered Receipt can be saved to a user s hard drive or disk for later authentication or forwarded by to third parties, without corrupting its ability to be authenticated in the future. Any party holding this Registered Receipt can forward it to the RPost system, which will use cryptographic methods to determine if the data regarding the Registered Receipt record, as well as the embedded original content and attachments (including the transmission metadata, and sending/delivery (POD and POR) record and timestamps) has been altered. If the data in the Registered Receipt e- mail is authenticated, then RPost automatically and immediately reconstructs an authenticated copy of the original message as it was received by the RPost server, including the attachments, and all notifications and transaction records, including authenticated POD and POR timestamps cryptographically associated with the original message content, and transmission data relevant to the delivery of the and its attachments (including all relevant metadata). SERVICE PLAN DETAILS Registered services are also enabled with RMail business and shared volume plans. Shared Volume Plan Features High Volume Senders: These plans are for organizations that have high-volume senders, automated sending from business applications, or shared workflow sending addresses. Shared Service License: These plans include all Business Plan features with a shared service license for up to the designated number of users, sending up to the designated aggregate RMail message volume (total across all users), over the designated period of time (monthly, annual, or as used). These plans automatically replenish at the end of the period or if volume has been completed, upon re-order or upgrade. 19

21 Add-On: Security Gateway & Customization Security Gateway Features: The Security Gateway adds policy-based Registered and encryption sending, and more, as an add-on for designated Business Per User Plans and Shared Volume Plans. The Security Gateway is installed as an add-on to the customer messaging server environment such that inbound and/or outbound message traffic passes through. This adds a native content policy engine to provide data loss prevention (DLP) content inspection and automated routing of content identified messages for encrypted delivery, for Registered certified e-delivery proof, or for recipient e-signoff. Automated encryption enforcement may be triggered based on sender, recipient, tags by user (e.g., adding "Secure" or "(R)" to the subject line), data classification tags, content inspection of messages or attachments, and combinations. The Security Gateway also includes market leading messaging security including anti-spam, anti-virus, anti-spyware, anti-ransomware and other threat prevention scanning on in-and-outbound traffic. Customization: Organizations that choose to have more control over the user experience may do so with an added advanced installation configuration file that permits the installer to customize defaults, user interface layout, and more than 30 other specialized user experience options. 20

22 OTP Messaging: Quantum Secure Messaging App OTP Messaging is the first quantum secure messaging app. OTP Messaging provides unbreakable message encryption across a private network separate from , using the One-Time Pad theory of encryption with each unique encryption key pad generated from a quantum random number generator, for the ultimate in messaging secrecy and anonymity. One-Time Pad is the only method of encryption which has been mathematically proven to be unbreakable. The OTP Messaging service implements this One-Time Pad theory of encryption in a user-friendly service that operates as a private messaging network separate from . Each subscriber to the OTP Messaging service receives an OTP Messaging encryption key (OTP Key) that comes in the form of a memory card. Users simply plug this OTP Key into a computing device, open the OTP Messaging app, and start sending/receiving quantum secure messages. This OTP Key includes each user s unique messaging address and a self-contained messaging application used to compose, send, receive, and store secure messages. It also contains a unique data pad of random numbers, created by a quantum random number generator, which is the user s One-Time Pad used to encrypt and decrypt the user s messages. All messages are indistinguishable from random data. Use the OTP Messaging service to communicate to anyone else who has an OTP Key. Your messages can be any size and addressed to as many people as you wish. You may attach files of any size or type; all will be unbreakably encrypted. Your communications are anonymous and untraceable. RPost, the provider of patented OTP Messaging for Ingram Micro, has been enhancing customer security, compliance and productivity for more than a decade. QUICK GUIDE TO BENEFITS OTP Messaging provides unbreakable quantum secure messaging across a private network separate from . The OTP Messaging service permits you to communicate to anyone else who has an OTP Key. Your messages can be any size and addressed to as many people as you wish. You may attach files of any size or type; all will be unbreakably encrypted. Your communications are anonymous and untraceable. OTP Messaging Features Include: One-Time Pad Encrypted Delivery: messages are converted to random data at the sender, based on the one-time pad encryption method, and transmitted as unique sets of random data to each recipient. Eyes Only: The recipient may only view message parts as they are reading it. Read Once: The message self-destructs after it is read once and closed. Shred: No plaintext messages are stored on your device or OTP key. Once data is used, all data is multiply overwritten and nulled to make it unrecoverable. Anonymity: There is no metadata to identify you or the recipients of your message, or associate any identity with the OTP Key or transmission. There is no data stored in the OTP Messaging system to identify a sender or recipient. Encrypted File Transfer: Transfer files and attachments with unbreakable encryption. 21

23 Read Receipt: The sender may opt to permit the recipient to return a notice that the recipient has read the sender s message. SERVICE PLAN DETAILS With the OTP Messaging service, you are purchasing an OTP Key that has a service plan based on how much quantum secure data you wish to send and receive. To send and receive OTP Messaging quantum secure messages, you need an OTP Key. Each OTP Key includes the OTP Messaging user interface to send, receive, store and manage your communications and account, with all data and components self-contained on the OTP Key. The OTP Key accesses the OTP Messaging quantum secure messaging network. There is nothing else you need to send quantum secure messages other than recipients who also have OTP Keys. Can I use my OTP Key with any computer or mobile device? OTP Keys are available on SD cards, Micro-SD cards, or Mini-USBs. You will need to use these in a computing device that has an SD card slot or can accommodate a USB. There are user interfaces designed for Windows and Mac operating systems. For a list of other systems or mobile devices that you may use. How many messages can I send with my OTP Key? The OTP Key includes a set of random data that is used for each message sent and received, for encryption and decryption. The random data depletes with each transmission as it may only be used one time per the One-Time Pad theory of encryption. You may purchase OTP Keys that have different data allocations. The amount of messages you can send and receive per gigabyte of quantum random data stored on your key depends on the size of your messages and whether you include attached files, and the size of these files. Considering industry standards, you may consider each gigabyte of data to permit between 10,000 and 50,000 messages sent and received, with the range depending on whether you send most messages with attachments, or most messages with only message text. What happens when I use all of my data? With each message sent or received, after encryption or decryption, the data used to encrypt or decrypt will be destroyed, following the One-Time Pad theory of encryption. As such, your OTP Key will deplete over time. When your OTP data runs out, you should purchase a new OTP Key with a new OTP Messaging ID, and destroy your previous OTP Key. How will I receive my OTP Key? Consistent with the One-Time Pad theory of encryption, the OTP Keys cannot be ed or downloaded --- as such methods of delivery would create additional copies of your OTP Key (invalidating the One-Time Pad theory of encryption). OTP Keys will be mailed using a traditional mail courier service. You should expect delivery to take up to four weeks for preparation and shipping. 22

24 The Global Standard for Secure & Certified Electronic Communications E-delivery Proof. Encryption. E-signatures. The RPost products and Registered technology have been used in more than 100 countries worldwide by governments and businesses of all sizes. Product and Technology Information:

Single Sign-On. Introduction

Single Sign-On. Introduction Introduction DeliverySlip seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single

More information

Cirius Secure Messaging Single Sign-On

Cirius Secure Messaging Single Sign-On Cirius Secure Messaging seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single

More information

Single Sign-On. Introduction. Feature Sheet

Single Sign-On. Introduction. Feature Sheet Feature Sheet Single Sign-On Introduction CipherPost Pro seamlessly integrates into your enterprise single sign-on (SSO) to give your users total email security and an extra set of robust communications

More information

Secure Messaging Large File Sharing

Secure Messaging Large File Sharing Feature Sheet Secure Messaging Large File Sharing Use Secure Messaging to securely share, track, and control single or multiple file attachments of up to 5GB directly from your email Whether you re using

More information

Evaluating Encryption Products

Evaluating  Encryption Products Evaluating Email Encryption Products A Comparison of Virtru and Zix Importance of Email Encryption Most modern email providers, such as Google and Microsoft, offer excellent default security options, but

More information

Secure communications simplified

Secure communications simplified Secure communications simplified Cirius is a powerful, secure, cloud-based communications and information management solution that enables regulated and non-regulated organizations to effectively protect,

More information

E-Share: Secure Large File Sharing

E-Share: Secure Large File Sharing Feature Sheet E-Share: Secure Large File Sharing Use DeliverySlip to securely share, track, and control single or multiple file attachments up to 5 GB directly from your email Sharing large files securely

More information

CipherPost Pro. Secure communications simplified. Feature Sheet

CipherPost Pro. Secure communications simplified. Feature Sheet Feature Sheet CipherPost Pro Secure communications simplified CipherPost Pro is a powerful, secure, cloud-based communications and information management solution that enables regulated and non-regulated

More information

E-Share: Secure Large File Sharing

E-Share: Secure Large File Sharing Feature Sheet E-Share: Secure Large File Sharing Use CipherPost Pro to securely share, track, and control single or multiple file attachments up to 5 GB directly from your email Sharing large files securely

More information

GLBA Compliance. with O365 Manager Plus.

GLBA Compliance. with O365 Manager Plus. GLBA Compliance with O365 Manager Plus www.o365managerplus.com About GLBA The Gramm-Leach-Bliley Act (GLB Act or GLBA) is also known as the Financial Modernization Act of 1999. It is a United States federal

More information

Minimum Requirements Weighted Score

Minimum Requirements Weighted Score Pge 1 of 8 0 = Does not meet criterion; 1 = Meets criterion; 2 = significantly exceeds criterion Google Microsoft Zimbra Zimbra Minimum Requirements Apps for Edu. Office 365 (on-premesis) (hosted) Common

More information

Cirius Secure Messaging Enterprise Dedicated Cloud

Cirius Secure Messaging Enterprise Dedicated Cloud Secure messaging and message control that is flexible to data jurisdiction, integrates rapidly into Office 365 and Outlook, and supports regulatory compliance. Enterprise organizations are recognizing

More information

Basic. $5/user per mo.

Basic. $5/user per mo. Product Suite Intelligent office suite Secure cloud-based file storage per user 30 GB Unlimited Unlimited Access across devices (computer, phone, or tablet) Works without an Internet connection Compatible

More information

UNCLASSIFIED. Mimecast UK Archiving Service Description

UNCLASSIFIED. Mimecast UK  Archiving Service Description UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly

More information

Version: 4.0. Quatrix Data Sheet. January 2018 Author: Maytech

Version: 4.0. Quatrix Data Sheet. January 2018 Author: Maytech Version: 4.0 Quatrix Data Sheet January 2018 Author: Maytech Problem Consumer file sharing services such as Hightail, WeTransfer and Dropbox are causing a massive headache for enterprise IT as BYOFT (bring

More information

Microsoft Office 365 TM & Zix Encryption

Microsoft Office 365 TM & Zix  Encryption Microsoft Office 365 TM & Zix Email Encryption A Natural Fit www.zixcorp.com INTRODUCTION IT managers and decision makers are being pressured from all sides to find ways to safely migrate to cloud-based

More information

CipherPost Pro Enterprise Dedicated Cloud

CipherPost Pro Enterprise Dedicated Cloud Feature Sheet CipherPost Pro Enterprise Dedicated Cloud Secure messaging and message control that is flexible to data jurisdiction, integrates rapidly into Office 365 and Outlook and supports regulatory

More information

File Transfer and the GDPR

File Transfer and the GDPR General Data Protection Regulation Article 32 (2): In assessing the appropriate level of security account shall be taken in particular of the risks that are presented by processing, in particular from

More information

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed. Technical Overview Technical Overview Standards based Architecture Scalable Secure Entirely Web Based Browser Independent Document Format independent LDAP integration Distributed Architecture Multiple

More information

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

Datasheet. Only Workspaces delivers the features users want and the control that IT needs. Datasheet Secure SECURE Enterprise ENTERPRISE File FILE Sync, SYNC, Sharing SHARING and AND Content CONTENT Collaboration COLLABORATION BlackBerry Workspaces makes enterprises more mobile and collaborative,

More information

SolarWinds Mail Assure

SolarWinds Mail Assure TECHNICAL PRODUCT DATASHEET SolarWinds Mail Assure Email Protection & Email Archive SolarWinds Mail Assure provides best-in-class protection against email-based threats, such as spam, viruses, phishing,

More information

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike Anonymous Application Access Product Brief Contents Introduction 1 The Safe-T Solution 1 How It Works 2-3 Capabilities 4 Benefits 4 List 5-11 Introduction With the move to the digital enterprise, all organizations

More information

HIPAA Compliance. with O365 Manager Plus.

HIPAA Compliance. with O365 Manager Plus. HIPAA Compliance with O365 Manager Plus www.o365managerplus.com About HIPAA HIPAA, the Health Insurance Portability and Accountability Act, sets the standard for protecting sensitive patient data. Any

More information

Secure E-Signature. The first truly secure way to easily and quickly sign and exchange digitally approved documents

Secure E-Signature. The first truly secure way to easily and quickly sign and exchange digitally approved documents The first truly secure way to easily and quickly sign and exchange digitally approved documents Electronic signature functionality is rapidly becoming an essential tool in every business, with users increasingly

More information

Netwrix Auditor for SQL Server

Netwrix Auditor for SQL Server Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

Adobe Sign and 21 CFR Part 11

Adobe Sign and 21 CFR Part 11 Adobe Sign and 21 CFR Part 11 Today, organizations of all sizes are transforming manual paper-based processes into end-to-end digital experiences speeding signature processes by 500% with legal, trusted

More information

Virtru Microsoft Protection

Virtru Microsoft  Protection Virtru Microsoft Email Protection Seamless Experience, Automatic Protection, Persistent Control Encrypt Outlook and OWA on the client-side with the flip of a switch Track and control access to emails and

More information

Overview of Archiving. Cloud & IT Services for your Company. EagleMercury Archiving

Overview of  Archiving. Cloud & IT Services for your Company. EagleMercury  Archiving EagleMercury Email Archiving Part of EagleMercury Security Collaboration Suite Assure compliance, speed ediscovery, and help protect your intellectual property Overview of Email Archiving EagleMercury

More information

Better Security By Design

Better Security By Design Better Security By Design DeliverySlip is superior to conventional encryption. Secure Messaging Database & Transport Better security starts with the storage of information in a Secure Messaging Database.

More information

Service Description VMware Workspace ONE

Service Description VMware Workspace ONE VMware Workspace ONE Last Updated: 05 April 2018 The product described in this Service Description is protected by U.S. and international copyright and intellectual property laws. The product described

More information

Securing Office 365 with SecureCloud

Securing Office 365 with SecureCloud Securing Office 365 with SecureCloud 1 Introduction Microsoft Office 365 has become incredibly popular because of the mobility and collaboration it enables. With Office 365, companies always have the latest

More information

esign Genie Quick Start Guide

esign Genie Quick Start Guide #1 Easiest and Most Collaborative Esignature Software Solution Highlights 1. Electronic Signature Scenarios and User Processes esign Genie Quick Start Guide 2. Create Reusable Templates and Send 3. Create

More information

Avanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved.

Avanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved. Avanan for G Suite Technical Overview Contents Intro 1 How Avanan Works 2 Email Security for Gmail 3 Data Security for Google Drive 4 Policy Automation 5 Workflows and Notifications 6 Authentication 7

More information

Secure Messaging is far more than traditional encryption.

Secure Messaging is far more than traditional encryption. Resellers Secure Messaging TM Secure Messaging Secure Messaging is far more than traditional encryption. It s an easy-to-use encryption and message control platform that empowers greater communication,

More information

Know Your Customer. c360 Microsoft Dynamics CRM 4.0 Product Catalog

Know Your Customer. c360 Microsoft Dynamics CRM 4.0 Product Catalog c360 Microsoft Dynamics CRM 4.0 Product Catalog Know Your Customer c360 products extend the functionality and industry focus of Microsoft Dynamics CRM c360 Core Productivity Pack Explorer (CRM Search Engine)

More information

Export out report results in multiple formats like PDF, Excel, Print, , etc.

Export out report results in multiple formats like PDF, Excel, Print,  , etc. Edition Comparison DOCSVAULT Docsvault is full of features that can help small businesses and large enterprises go paperless. The feature matrix below displays Docsvault s abilities for its Enterprise

More information

In-Depth Guide to PaperVision Enterprise

In-Depth Guide to PaperVision Enterprise 800.422.1330 In-Depth Guide to is a simple and searchable enterprise content management (ECM) system. Securley store, share and collaborate on any type of information with unlimited users inside. 800.422.1330

More information

Maintain Data Control and Work Productivity

Maintain Data Control and Work Productivity DATA SHEET CloudAlly Backup The Complete Microsoft 365 Solution: Office 365 Exchange, SharePoint, and OneDrive KEY CAPABILITIES CloudAlly s cloud-to-cloud backup solution for the complete Microsoft cloud

More information

Secure E-Signature. The first truly secure way to easily and quickly sign and exchange digitally approved documents. Feature Sheet

Secure E-Signature. The first truly secure way to easily and quickly sign and exchange digitally approved documents. Feature Sheet Feature Sheet Secure E-Signature The first truly secure way to easily and quickly sign and exchange digitally approved documents Electronic signature functionality is rapidly becoming an essential tool

More information

Citrix Analytics Data Governance Collection, storage, and retention of logs generated in connection with Citrix Analytics service.

Citrix Analytics Data Governance Collection, storage, and retention of logs generated in connection with Citrix Analytics service. Citrix Analytics Data Governance Collection, storage, and retention of logs generated in connection with Citrix Analytics service. Citrix.com Data Governance For up-to-date information visit: This section

More information

Introduction Secure Message Center (Webmail, Mobile & Visually Impaired) Webmail... 2 Mobile & Tablet... 4 Visually Impaired...

Introduction Secure Message Center (Webmail, Mobile & Visually Impaired) Webmail... 2 Mobile & Tablet... 4 Visually Impaired... WEB MESSAGE CENTER END USER GUIDE The Secure Web Message Center allows users to access and send and receive secure messages via any browser on a computer, tablet or other mobile devices. Introduction...

More information

Privacy Policy Effective May 25 th 2018

Privacy Policy Effective May 25 th 2018 Privacy Policy Effective May 25 th 2018 1. General Information 1.1 This policy ( Privacy Policy ) explains what information Safety Management Systems, 2. Scope Inc. and its subsidiaries ( SMS ), it s brand

More information

CYBER SECURITY & COMPLIANCE BUYER S GUIDE. For Real Estate Services Providers

CYBER SECURITY & COMPLIANCE BUYER S GUIDE. For Real Estate Services Providers CYBER SECURITY & COMPLIANCE BUYER S GUIDE For Real Estate Services Providers The Real Estate Services Providers Council (RESPRO ) has developed this Cyber Security and Compliance Buyer s Guide to assist

More information

Symantec Security.cloud

Symantec  Security.cloud Data Sheet: Messaging Security filters unwanted messages and protects mailboxes from targeted attacks. The service has selflearning capabilities and Symantec intelligence to deliver highly effective and

More information

Integration of Agilent OpenLAB CDS EZChrom Edition with OpenLAB ECM Compliance with 21 CFR Part 11

Integration of Agilent OpenLAB CDS EZChrom Edition with OpenLAB ECM Compliance with 21 CFR Part 11 OpenLAB CDS Integration of Agilent OpenLAB CDS EZChrom Edition with OpenLAB ECM Compliance with 21 CFR Part 11 Technical Note Introduction Part 11 in Title 21 of the Code of Federal Regulations includes

More information

Advanced encryption and message control to complement and enhance your security investment in ZixDLP.

Advanced  encryption and message control to complement and enhance your security investment in ZixDLP. Secure Messaging Encryption and Control for ZixDLP Advanced email encryption and message control to complement and enhance your security investment in ZixDLP. Businesses of every size, in every industry

More information

RPost's Registered services and Evidence issues within the United Kingdom Legal System

RPost's Registered  services and Evidence issues within the United Kingdom Legal System RPost's Registered E-mail services and Evidence issues within the United Kingdom Legal System By Alan Shipman, Author, British Standards Institute Legal admissibility Code of Practice BIP 0008 London,

More information

Beam Technologies Inc. Privacy Policy

Beam Technologies Inc. Privacy Policy Beam Technologies Inc. Privacy Policy Introduction Beam Technologies Inc., Beam Dental Insurance Services LLC, Beam Insurance Administrators LLC, Beam Perks LLC, and Beam Insurance Services LLC, (collectively,

More information

BACKUP APP V7 CLOUUD FILE BACKUP & RESTORE GUIDE FOR WINDOWS

BACKUP APP V7 CLOUUD FILE BACKUP & RESTORE GUIDE FOR WINDOWS V7 CLOUUD FILE BACKUP & RESTORE GUIDE FOR WINDOWS Table of Contents 1 Overview... 1 1.1 About This Document... 7 2 Preparing for Backup and Restore... 8 2.1 Hardware Requirement... 8 2.2 Software Requirement...

More information

Magento GDPR Frequently Asked Questions

Magento GDPR Frequently Asked Questions Magento GDPR Frequently Asked Questions Whom does GDPR impact? Does this only impact European Union (EU) based companies? The new regulation provides rules that govern how companies may collect and handle

More information

Table of Contents. Page 1 of 6 (Last updated 27 April 2017)

Table of Contents. Page 1 of 6 (Last updated 27 April 2017) Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational

More information

Compliance in 5 Steps

Compliance in 5 Steps Email Compliance in 5 Steps Introduction For most businesses, email is a vital communication resource. Used to perform essential business functions, many organizations rely on email to send sensitive confidential

More information

Simple and Powerful Security for PCI DSS

Simple and Powerful Security for PCI DSS Simple and Powerful Security for PCI DSS The regulations AccessEnforcer helps check off your list. Most merchants think they are too small to be targeted by hackers. In fact, their small size makes them

More information

ONE Mail Direct for Web Browsers

ONE Mail Direct for Web Browsers ONE Mail Direct for Web Browsers Guide Version:1.1 Document ID: 3930 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2015, ehealth Ontario All rights reserved No part of this document

More information

Competitive Matrix - IRONSCALES vs Alternatives

Competitive Matrix - IRONSCALES vs Alternatives Competitive Matrix - IRONSCALES vs Alternatives Traditional Awareness and Training Features IRONSCALES SEG PhishMe Wombat Knowbe4 Sans Institute Simulation & Training Compliance PCI/DSS, HIPAA, GLBA to

More information

Citrix ShareFile Share, store, sync, and secure data on any device, anywhere

Citrix ShareFile Share, store, sync, and secure data on any device, anywhere Citrix ShareFile Share, store, sync, and secure data on any device, anywhere Data Sheet ShareFile is a secure, enterprise data sync and sharing service with flexible storage options that allows IT to mobilize

More information

How to Access Protected Health Information from Anywhere and Stay Compliant

How to Access Protected Health Information from Anywhere and Stay Compliant How to Access Protected Health Information from Anywhere and Stay Compliant Secure, HIPAA-compliant file sharing & data storage with mobile data access Safeguard protected health information (PHI), support

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

Adobe Sign for Microsoft Dynamics

Adobe Sign for Microsoft Dynamics Adobe Sign for Microsoft Dynamics Installation & Configuration Guide (v5) Last Updated: March 16, 2017 2017 Adobe Systems Incorporated. All rights reserved Table of Contents Overview... 3 Prerequisites...

More information

CipherCloud CASB+ Connector for ServiceNow

CipherCloud CASB+ Connector for ServiceNow ServiceNow CASB+ Connector CipherCloud CASB+ Connector for ServiceNow The CipherCloud CASB+ Connector for ServiceNow enables the full suite of CipherCloud CASB+ capabilities, in addition to field-level

More information

VMware AirWatch Google Sync Integration Guide Securing Your Infrastructure

VMware AirWatch Google Sync Integration Guide Securing Your  Infrastructure VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms in the HIPAA Privacy Rule.

Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms in the HIPAA Privacy Rule. Medical Privacy Version 2018.03.26 Business Associate Agreement This Business Associate Agreement (the Agreement ) shall apply to the extent that the Lux Scientiae HIPAA Customer signee is a Covered Entity

More information

Data Protection and GDPR

Data Protection and GDPR Data Protection and GDPR At DPDgroup UK Ltd (DPD & DPD Local) we take data protection seriously and have updated all our relevant policies and documents to ensure we meet the requirements of GDPR. We have

More information

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE (FORMERLY UTILITY HOSTING)... 2 4 TAILORED INFRASTRUCTURE (FORMERLY DEDICATED HOSTING)... 3 5 COMPUTE... 3 6 BACKUP & RECOVERY... 8

More information

Adobe Sign for MS Dynamics 365 CRM

Adobe Sign for MS Dynamics 365 CRM Adobe Sign for MS Dynamics 365 CRM User Guide v7 Last Updated: May 31, 2018 2018 Adobe Systems Incorporated. All rights reserved Contents Overview... 3 Gaining Access to Adobe Sign...4 Sending for Signature...

More information

Don t just manage your documents. Mobilize them!

Don t just manage your documents. Mobilize them! Don t just manage your documents Mobilize them! Don t just manage your documents Mobilize them! A simple, secure way to transform how you control your documents across the Internet and in your office.

More information

MESSAGING SECURITY GATEWAY. Solution overview

MESSAGING SECURITY GATEWAY. Solution overview MESSAGING SECURITY GATEWAY Solution overview April 2017 CONTENTS Executive Summary...3 The case for email protection and privacy... 3 Privacy in email communication... 3 LinkedIn Phishing Sample...4 Messaging

More information

Google Apps Premier Edition

Google Apps Premier Edition Google Apps Premier Edition Powerful solutions. Google innovation. Low cost. CONTACT INFORMATION google.com/a/enterprise With Google Apps Premier Edition, you can give your employees the nextgeneration

More information

Backup APP v7. Office 365 Exchange Online Backup & Restore Guide for Mac OS X

Backup APP v7. Office 365 Exchange Online Backup & Restore Guide for Mac OS X Backup APP v7 Office 365 Exchange Online Backup & Restore Guide for Mac OS X Revision History Date Descriptions Type of modification 5 Apr 2017 First Draft New Table of Contents 1 Overview... 1 About This

More information

Unit 7: Working with

Unit 7: Working with Unit 7: Working with Email Questions Covered What kinds of inbound and outbound email are possible in Agiloft? How do we configure the system to send outbound email and receive inbound email? Why set up

More information

PKI Credentialing Handbook

PKI Credentialing Handbook PKI Credentialing Handbook Contents Introduction...3 Dissecting PKI...4 Components of PKI...6 Digital certificates... 6 Public and private keys... 7 Smart cards... 8 Certificate Authority (CA)... 10 Key

More information

Storage Made Easy. SoftLayer

Storage Made Easy. SoftLayer Storage Made Easy Providing an Enterprise File Fabric for SoftLayer STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR SOFTLAYER The File Fabric is a comprehensive multi-cloud data security solution built on

More information

Sales Training for DataMotion Products. March, 2014

Sales Training for DataMotion Products. March, 2014 Sales Training for DataMotion Products March, 2014 Outline Market Overview Product Overviews Competitive Overview Solution Examples 2 Market Overview Compliance is Complicated Financial Payment Card Industry

More information

Sophos Mobile. startup guide. Product Version: 8.1

Sophos Mobile. startup guide. Product Version: 8.1 Sophos Mobile startup guide Product Version: 8.1 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are

More information

Oracle Data Cloud ( ODC ) Inbound Security Policies

Oracle Data Cloud ( ODC ) Inbound Security Policies Oracle Data Cloud ( ODC ) Inbound Security Policies Contents Contents... 1 Overview... 2 Oracle Data Cloud Security Policy... 2 Oracle Information Security Practices - General... 2 Security Standards...

More information

NETWRIX GROUP POLICY CHANGE REPORTER

NETWRIX GROUP POLICY CHANGE REPORTER NETWRIX GROUP POLICY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 November 2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

DROPBOX.COM - PRIVACY POLICY

DROPBOX.COM - PRIVACY POLICY Dropbox Privacy Policy Last Modified: October 15, 2012 This Privacy Policy provides our policies and procedures for collecting, using, and disclosing your information. Users can access the Dropbox service

More information

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government

More information

IBM MaaS360 (SaaS) 1.1 IBM MaaS360 Mobile Device Management (SaaS) and IBM MaaS360 Mobile Device Management (SaaS) Step up for existing customers

IBM MaaS360 (SaaS) 1.1 IBM MaaS360 Mobile Device Management (SaaS) and IBM MaaS360 Mobile Device Management (SaaS) Step up for existing customers Service Description IBM MaaS360 (SaaS) This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud Service.

More information

Forms. GDPR for Zoho Forms

Forms. GDPR for Zoho Forms GDPR for Zoho Forms The What The General Data Protection Regulation (GDPR) is a regulation that empowers the residents of the European Union (EU) with better transparency, access and control of their personal

More information

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3. INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS Protect Critical Enterprise Applications and Cardholder Information with Enterprise Application Access Scope and Audience This guide is for

More information

Adobe Document Cloud esign Services. for Salesforce Version 17 Installation and Customization Guide

Adobe Document Cloud esign Services. for Salesforce Version 17 Installation and Customization Guide Adobe Document Cloud esign Services for Salesforce Version 17 Installation and Customization Guide 2015 Adobe Systems Incorporated. All rights reserved. Last Updated: August 28, 2015 Table of Contents

More information

WAM!NET Direct! SM. Service Description

WAM!NET Direct! SM. Service Description WAM!NET Direct! SM Service Description INTRODUCTION The Direct! Service is a subscription based content delivery service that provides customers with the ability to send, receive, and track digital files

More information

The Solution Your Legal Department Has Been Looking For

The Solution Your Legal Department Has Been Looking For Blog Post The Solution Your Legal Department Has Been Looking For Microsoft Outlook to be my DM Desktop In my experience every Legal Department has users who previously worked at a law firm, where they

More information

HIPAA Compliance & Privacy What You Need to Know Now

HIPAA  Compliance & Privacy What You Need to Know Now HIPAA Email Compliance & Privacy What You Need to Know Now Introduction The Health Insurance Portability and Accountability Act of 1996 (HIPAA) places a number of requirements on the healthcare industry

More information

PGP(TM) Universal Server Version 3.2 Maintenance Pack Release Notes

PGP(TM) Universal Server Version 3.2 Maintenance Pack Release Notes PGP(TM) Universal Server Version 3.2 Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

More information

#1 Enterprise File Share, Sync, Backup and Mobile Access for Business

#1 Enterprise File Share, Sync, Backup and Mobile Access for Business #1 Enterprise File Share, Sync, Backup and Mobile Access for Business Top 10 Benefits 1 2 Best ROI in the Industry 4 5 Secure Access Smart Drive files and comply with regulations. Share Securely Security

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the

More information

Getting ready for GDPR

Getting ready for GDPR Getting ready for GDPR Cybersecurity for Data Protection Brought to you by: What is GDPR? The (GDPR) is the European Union s response to the increasing privacy demands of the European society. The primary

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

PRODUCT DESCRIPTIONS AND METRICS

PRODUCT DESCRIPTIONS AND METRICS PRODUCT DESCRIPTIONS AND METRICS Adobe PDM - Adobe LiveCycle Managed Services (2013v3) The Services described in this PDM are Managed Services and are governed by the terms of the General Terms, the Exhibit

More information

Storage Made Easy. Mirantis

Storage Made Easy. Mirantis Storage Made Easy Providing an Enterprise File Fabric for Mirantis STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR MIRANTIS The File Fabric is a comprehensive multi-cloud data security solution built on top

More information

AN IPSWITCH WHITEPAPER. 7 Steps to Compliance with GDPR. How the General Data Protection Regulation Applies to External File Transfers

AN IPSWITCH WHITEPAPER. 7 Steps to Compliance with GDPR. How the General Data Protection Regulation Applies to External File Transfers AN IPSWITCH WHITEPAPER 7 Steps to Compliance with GDPR How the General Data Protection Regulation Applies to External File Transfers Introduction Stolen personal data drives a thriving black market for

More information

Office 365 Buyers Guide: Best Practices for Securing Office 365

Office 365 Buyers Guide: Best Practices for Securing Office 365 Office 365 Buyers Guide: Best Practices for Securing Office 365 Microsoft Office 365 has become the standard productivity platform for the majority of organizations, large and small, around the world.

More information

SQL Server Solutions GETTING STARTED WITH. SQL Secure

SQL Server Solutions GETTING STARTED WITH. SQL Secure SQL Server Solutions GETTING STARTED WITH SQL Secure Purpose of this document This document is intended to be a helpful guide to installing, using, and getting the most value from the Idera SQL Secure

More information

Storage Made Easy. Providing an Enterprise File Fabric for INVESTOR NEWSLETTER ISSUE N 3

Storage Made Easy. Providing an Enterprise File Fabric for INVESTOR NEWSLETTER ISSUE N 3 INVESTOR NEWSLETTER ISSUE N 3 Storage Made Easy Providing an Enterprise File Fabric for STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR OPENIO Storage Made Easy (SME) File Fabric is a comprehensive Enterprise

More information

SaaS Flyer for Trend Micro

SaaS Flyer for Trend Micro SaaS Flyer for Trend Micro Prices Effective July 1, 2008 1 Internet Security 2008 Trend Micro Internet Security 2008 makes it easy to protect your home or small business network, personal identity, and

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Automile User Guide. Last updated May 2017

Automile User Guide. Last updated May 2017 Automile User Guide Last updated May 2017 Welcome to Automile We are excited to have you onboard. In this guide, you will find detailed instructions on how to install your Automile Box and how to use both

More information

Implementing Electronic Signature Solutions 11/10/2015

Implementing Electronic Signature Solutions 11/10/2015 Implementing Electronic Signature Solutions 11/10/2015 Agenda Methodology, Framework & Approach: High-Level Overarching Parameters Regarding Electronic Service Delivery Business Analysis & Risk Assessment

More information