90 likes | 217 Views
Five Key Issues you must know about Email Encryption to comply with laws and Regulations and avoid E & O’s. Community Webinars. Sam Stuckart Zixcorp and Sheyne Branconnier Seacoast Telecom . www.zixcorp.com www.link2exchange.com. Insurance Community Center.
E N D
Five Key Issues you must know about Email Encryption to comply with laws and Regulations and avoid E & O’s Community Webinars
Sam Stuckart Zixcorp and Sheyne Branconnier Seacoast Telecom www.zixcorp.com www.link2exchange.com
Insurance Community Center • Presents Monthly Webinars Free to Community Members • Community webinars are archived on the Community homepage under the right hand tab titled: Webinar Archive
Five Key Issues • Business Justifications of email encryption • Threats to your company • Regulatory and Compliance pressures • Components of Email Encryption • Best Method of Delivery
email has become the preferred methodfor transferring information and documents • Other methods like fax, courier, CD, are time consuming and expensive • Instructing employees to not email sensitive information is not reliable • Encrypting email allows employees to be productive while protecting private information and the organization Business Justification of email encryption
Threats to your company • Jeopardize your customers loyalty and trust • Put your company’s reputation at risk • Financial cost of researching a suspected incident • Create a distraction to your core business and focus
HIPAA- Health Insurance Portability and Accountability Act regulations • HITECH-Health Information Technology for Economic and Clinical Health • GLBA- Gramm-Leach-Bliley Act • State Security Laws (NV, MA, WA) • Fines from regulatory agencies Regulatory and Compliance pressures
ZixDirectory- Global repository of hosted encryption keys • ZixMail-standalone encryption • ZixGateway-appliance with policies and content filter • ZixGateway shared-hosted Gateway • ZixPort-Secure portal delivery method and two way secure email • ZixMobility- secure messages on mobile devices Components of Email Encryption
Zix to ZixMail • Zix to ZixGateway • Zix Managed TLS-Transport Layer Security • ZixPort delivery Best Method of Delivery