Blog

RPost Granted Three Patents on Most Fundamental Method of Tracking Email Delivery & Opening

July 24, 2012 / in Blog / by Zafar Khan, RPost CEO

RPost has been granted three additional patents (US Patent numbers 8,224,913; 8,209,389 and 8,161,104) which comprehensively cover systems and methods service providers use to track email opening, delivery or failure using server logs and web beacons – technology novel in 1999 when RPost first filed for the patents, but widely used today.

Litigation Counsel Guide: How to Prove Service of Court Documents by Email

July 11, 2012 / in Blog / by Zafar Khan, RPost CEO

This posting should serve as a reference guide for process servers or lawyers who need to prove service by email. (1) Request permission to serve by email

RPost Registered Email™ services Meet the ETSI Registered Electronic Mail Standard

June 24, 2012 / in Blog / by Zafar Khan, RPost CEO

This posting may serve as a useful reference to RPost Registered Email™ services compliance with the European Telecommunications Standards Institute (ETSI) Technical Specification (TS) produced by ETSI Technical Committee Electronic Signatures and Infrastructures (ESI) on the multi-part standards documentation covering Registered Electronic Mail (REM); Architecture, Formats, Policies and Profiles. ETSI claims to be officially recognized […]

Physician Groups Turn to RPost for HIPAA Compliance, Electronic Signatures, and Registered Email Delivery Proof

May 30, 2012 / in Blog / by Zafar Khan, RPost CEO

Be Well  Solutions, a wellness center, reports that they have used RPost with unquestionable success in terms of paper reduction, proof of compliance with HIPAA data privacy requirements, and proof of who sent what to whom and when.

Would Metadata Cleaning Spoil Your Evidence?

May 03, 2012 / in Blog / by Zafar Khan, RPost CEO

In Dr. Ball’s blog, he smartly notes: “Application metadata resides within the file and moves with the file, not changing unless the contents of the file are altered. System metadata resides outside the file and can be altered without impacting the contents of the file. Hashing the file hashes its contents, not information about the file. That is, you only hash what’s stored inside the file, not its system metadata.” He also […]