01 Oct 2010

Legal Proof meets Email Encryption

After much discussion about blogs and after writing three detailed responses to inquiries just today, it occurred to me that these responses are likely interesting to some of our customers, shareholders, and advocates who track RPost. Therefore, let me share some of these daily discussions through a blog format. Let this be our first company blog – October 1, 2010, ten years after the inception of RPost.

In an email dialog today, Ken Adams questioned how much progress RPost has made in terms of gaining market acceptance for “Legal Proof,” citing a blog article he wrote and posted last year.

Rather than getting into growth curves, I thought Ken would be more interested in hearing about one area that our customers recently report to be quite important in terms of “legal proof” for email.  In the area of email encryption, we have seen a considerable change in the reasons why people buy email encryption services – from ensuring privacy of information to complying with privacy regulations. This change appears to be primarily due to the heighted enforcement actions by the regulators.  The Council of Insurance Agents & Brokers, in their Email Encryption Buyer’s Guide 2010, summarized the point nicely in the following quote:

“This is important because, in the case where there is a data breach after the email has reached the recipient (in the recipient’s environment, or after they have passed the information along to others), the sender will need to retain information to prove that the breach did not happen “on their watch” – that they in fact complied with the data security requirements and delivered the information in a compliant, encrypted manner.”

This point about using methods of sending email with delivery and content proof to prove certain content was transmitted in a manner in compliance with data protection and privacy regulations is something new – something that the market has indicated recently is a very good use for “legal proof” email.

The Council continued with, “It seems that only RPost has a robust mechanism in place to provide an auditable record of precisely what message content (body text and attachments) was in fact sent and received in an encrypted manner to each intended recipient.”  The Council selected RPost as their top recommendation for email encryption services in their Email Encryption Buyer’s Guide 2010, in part, due to the fact that the RPost service returns an auditable proof record of compliance with the encryption requirements and is the simplest to use.  Anyone who is currently using or intends to use email encryption services would certainly benefit from reading The Council’s market analysis prepared by their vice president of technology, which substantiates their positions.

RPost’s email encryption service has been built upon the REGISTERED EMAIL® standard that RPost pioneered in 2000.