In the annals of workplace mistakes, there is a hierarchy. At one level, there is the failure to make a fresh pot of coffee after finishing off the last carafe. Maybe one level up is when you decide that it’s a good idea to microwave (in the office kitchen at 10am) that leftover fish entrée you had last night. Continuing up the ladder, you have cases like when you ding your boss’ car in the parking lot. But then there those mistakes that are existential ones—slipups that could cost not only your job but also the livelihoods of colleagues and, perhaps, the whole company.
Get Some Rest (for Your Files) for the Rest of Your Summer
As we head into one of the summer’s final weekends, I’m doing the usual exercise of wondering where all the time went. This certainly was not a restful summer for the world what with Delta variants, ransomware attacks, record-setting wildfires and now hurricanes baring in on my hometown. On a lighter note, we were also not resting at RPost in bringing you our virtual user conference and many new, groundbreaking and value-packed features for RMail and RSign.
Right Email, Wrong Recipient. No Problem. Recall
The company travel agent, Leah, sometimes gets some really insightful inside information about her client company – sent to her accidentally. Fortunately, she is a trusted outside contractor and politely replies to her client, “I think you did not intend to send this to me.”
Why are you emailing your clients weblinks to documents? They’re not supposed to click on unknown links. It’s making them nervous. Even if you’re using popular apps like dropbox to share files, you can’t be sure your client will trust the link. Nor should they. They might think it’s a phishing scheme.
The Pentagon is the latest victim of an email spoofing campaign. Pentagon colleagues, partners and vendors are receiving fake emails that appear to be coming from Defense Security Service (DSS) employees. Cyber criminals are most likely trying to hack into company servers and then find a backdoor into the Pentagon server itself.
Much of the uncertainty as to the legality of electronically signed contracts has dissipated over the last decade and a half — through definitions in the broad state (UETA) and Federal (ESIGN) statutes, and through practice by the first few waves of adopters.
E-signature technology offers much more than just the ability to get a document signed remotely.
E-signature technology also provides businesses with the opportunity to completely reinvigorate decades-old business processes, enhance productivity, and automate mundane work flows.
All service providers (such as lawyers, doctors, accountants, financial advisors, etc.) who believe their communications with clients are private — and in some situations, privileged — should take note. Conversely, all clients who believe their communications with trusted service providers are private should also take note.
RSign achieves top score in breadth and depth of e-signature services, compliance with industry/country regulations and technical standards, and enterprise scalability categories.
In Dr. Ball’s blog, he smartly notes: “Application metadata resides within the file and moves with the file, not changing unless the contents of the file are altered. System metadata resides outside the file and can be altered without impacting the contents of the file. Hashing the file hashes its contents, not information about the file. That is, you only hash what’s stored inside the file, not its system metadata.” He also notes other points about how any hashing, and metadata cleaning, WOULD change the file.