This posting should serve as a reference guide for process servers or lawyers who need to prove service by email. (1) Request permission to serve by email
This posting may serve as a useful reference to RPost Registered Email™ services compliance with the European Telecommunications Standards Institute (ETSI) Technical Specification (TS) produced by ETSI Technical Committee Electronic Signatures and Infrastructures (ESI) on the multi-part standards documentation covering Registered Electronic Mail (REM); Architecture, Formats, Policies and Profiles. ETSI claims to be officially recognized […]
Be Well Solutions, a wellness center, reports that they have used RPost with unquestionable success in terms of paper reduction, proof of compliance with HIPAA data privacy requirements, and proof of who sent what to whom and when.
In Dr. Ball’s blog, he smartly notes: “Application metadata resides within the file and moves with the file, not changing unless the contents of the file are altered. System metadata resides outside the file and can be altered without impacting the contents of the file. Hashing the file hashes its contents, not information about the file. That is, you only hash what’s stored inside the file, not its system metadata.” He also […]
The Council of Insurance Agents and Brokers, in the 2010 Insurance Industry Email Encryption Buyer’s Guide, identified the most important criteria for compliant email encryption – criteria that holds true today as some of the most important purchase considerations. The Email Encryption Buyer’s Guide selects RMail email encryption as top choice (for both 2010 and 2011). RMail ranked […]
November 20, 2024
November 12, 2024
November 06, 2024
November 01, 2024
October 29, 2024