Robert Bond, one of the world’s premier legal experts in data privacy and information security, just hosted an exclusive webinar where he presented a number of practical reasons why every legal professional needs to do more than just use standard Microsoft Outlook or other basic technologies when corresponding with clients, other legal counsel, the courts […]
Openwave Messaging has elected to embed RMail® into the email user interface for 400 million end users who access email through their local telecommunications operator or ISP. This is the first time secure email encryption has been deployed in the market on such a grand scale. RMail® is powered by RPost’s patented Registered Email technology.
The RPost team thanks you, our community of users, customers, partners, shareholders, and advocates, for another exciting year at RPost. Your support enables the RPost team to continue innovating for our customers, and to maintain RPost as the global standard for secure and certified electronic communications. We believe the investments we have made over the […]
In a society that embraces online shopping, GPS location tracking, mobile texting and email anytime and anywhere, it is no wonder that technology’s promise of convenience continues to overrule many peoples’ instincts to protect and secure their private information.
On Sunday, more than a hundred media outlets around the world, coordinated by the Washington, DC-based International Consortium of Investigative Journalists (“ICIJ”), released stories on the “Panama Papers”, which is an exposé of private client and internal work product emails and other files. More than 5 million emails and files were stolen from within the […]
Imposter emails targeting businesses today are far more sophisticated than traditional phishing emails or the “Nigerian prince” emails of yesteryear. These new Business Email Compromise (BEC) attacks use imposter emails that reflect a deep understanding of people’s roles and messaging patterns within a target organization.
Lawyers have always had a duty to be competent in technology, but the ABA Model Rule put this duty in writing, impacting cybersecurity practices. Twenty states have followed the ABA’s lead and adopted a duty of technological competence, all but requiring encryption.
When it comes to getting a new car, one of the first decisions many consider is whether to buy or lease. Of course, there are pros and cons to either approach. Buying a car means you own it (and perhaps get positive feelings about owning it), and you have more freedom over its use; you […]
With the recent media focus on cybersecurity, whether it is talk of Russian hackers scheming to influence US presidential elections or “Brexit” votes, or the pervasive pressure to comply with HIPAA (healthcare privacy regulations) or other consumer data privacy requirements, “encryption” is one of the solutions that is often introduced.
You show up in court with a US Certified Mail “Green Card” delivery receipt, evidence that supposedly proves you delivered a timely notice. The other party simply stands up and says quizzically, “Sure we got the certified letter, but no one in our office could figure out why we were sent an empty envelope!” And […]
May 23, 2025
May 16, 2025
May 09, 2025
May 01, 2025
April 25, 2025