We at Tech Essentials realize this has been a doozy of a week in terms of news—mostly political and mostly bad. For those who needed a respite from Tuesday’s chaotic debate and the torrent of election-focused headlines, we offered a live virtual conference yesterday that highlighted how customers are using RPost’s RMail and RSign products to optimize financial processes, transaction automation and affordability with feature-rich e-sign and e-security.
If you are sending a zillion newsletter or marketing emails, sure, email marketing platforms make it easy to manage your email list; and many do provide some basic tracking information.
It is well accepted worldwide that the Registered Receipt™ email record is the gold standard for email proof — timestamped and verifiable proof of successful email delivery including content delivered, regardless of recipient settings, and without need for any recipient compliant action.
In our recent Tech Essentials edition, about the “million-dollar email,” delivery proof was at question. The recent events highlighted below emphasize the additional importance of being able to easily prove the content of your sent email. As you will read, it is very easy for a recipient to modify an email with a few mouse strokes, print to PDF, forward the modified copies, and suddenly you, the sender, are on the defensive… trying to prove what you sent was not what the receiver claims to have received from you.
Millennials are, surprisingly, bewitched by email. More than half of Millennials ages 18 to 24 check their email while still in bed in the morning, and 43% of Millennials ages 25 to 34 report doing the same thing. We were shocked to learn that Millennials prefer to check their email on a PC rather than their smartphone.
It seems innocent enough. Your attorney shares a few files by sending a link from their unprotected cloud storage account. They expect that you’ll only see the files that they intended to send. But there are huge risks to this approach. This behavior can result in the waiver of attorney client privilege.
In today’s financial circles, there is quite a bit of buzz around “blockchain” technology and its myriad of possible future applications. Is blockchain here to stay or is it just hype?
At Frankel Insurance, staff sent an email to bind additional commercial property to an existing policy. Later, a claim was submitted to the insurance carrier, and the carrier denied having a record of the additional property having been added to the policy.
In the final part of our three part series on common misconceptions about email delivery, we’ll discuss a type of system that many attorneys use and believe can prove fact of e-delivery.
The constant challenge for IT professionals and security experts is to balance security and usability. If the most secure system is too complicated or cumbersome to use, people will circumvent it. Once the official or corporate system is circumvented, security has devolved from professional (IT executive) to amateur (end user).