Blog

Are eSignatures Legal?

June 02, 2016 / in Blog / by Zafar Khan, RPost CEO

People use eSignatures every day without even realizing they’re “eSigning” — signing on an electronic signature pad at grocery store check-out, replying to an email with a typed confirmation of terms, or putting in a PIN code for a debit card transaction, for example. Most people have no doubts about the legality of these everyday […]

Hashed but Not Salted

May 20, 2016 / in Blog / by Zafar Khan, RPost CEO

You may remember the 2012 LinkedIn data breach, in which 6.5 million LinkedIn user accounts were believed to have been compromised. According to BBC and LinkedIn itself, the number of affected LinkedIn users from that 2012 data breach could actually be upwards of 100 million, or the majority of the 165 million users LinkedIn had in 2012.

Understanding HIPAA: Enforcement, Encryption, and Documentation

May 16, 2016 / in Blog / by Zafar Khan, RPost CEO

Email encryption is one of the strongest defenses that an organization can implement against data breaches brought on by the improper disclosure or distribution of medical records or protected health information (PHI). But without written policies and procedures governing the use of encryption services, these efforts mean next to nothing in the eyes of HIPAA […]

The Biggest Threat to Your Online Security Could Be Your Password

May 11, 2016 / in Blog / by Zafar Khan, RPost CEO

Email security has been a hot topic as of late, with last week’s news of a supposed breach of 272 million email usernames and passwords and recent statements made by a hacker who claims to have accessed Hillary Clinton’s private email server two years before the private server’s existence was first reported by the New York Times. In the […]

ABA Model Rule Supports Email Encryption

May 09, 2016 / in Blog / by Zafar Khan, RPost CEO

Lawyers have always had a duty to be competent in technology, but the ABA Model Rule put this duty in writing, impacting cybersecurity practices. Twenty states have followed the ABA’s lead and adopted a duty of technological competence, all but requiring encryption.