Email Encryption FEATURES

If you’re looking for user-based email encryption, User Based Email Encryption  service enables users to send emails with end-to-end encryption, so important documents such as contracts or company plans can now be safely sent via email.

Who needs encryption?

Email stored inside Exchange is secure. But most emails in transit are not secure. They are unencrypted and can easily be viewed without the sender or recipient ever knowing. This can cause security and regulatory issues when you send contracts, financial statements, strategic documents and other confidential data.

User Based Email Encryption  service helps make it safe for companies to send critical information via email.

How User Based Email Encryption keeps your protected

User Based Email Encryption is a secure and regulations-compliant email solution:

  • End-to-end encryption. This means that the message is encrypted in the senders’ desktop/PC/laptop and only unencrypted once it reaches the recipient’s mailbox.
  • Military-grade security. User Based Email Encryption is based on PKI with 1024-bit RSA keys, X.509 and S/MIME. These are the industry’s trusted standards.
  • Digital signatures. Each email is digitally signed and allows for an “electronic signature”. Your email recipients can feel assured that you wrote and sent the email—not an imposter.

Benefits of User Based Email Encryption

  • Easy installation. User Based Email Encryption is easy to install (a simple Outlook plug-in) and works immediately. You can even install the program on multiple computers for each user.
  • Send secure emails to anyone. Recipients of User Based Email Encryption do not need to be subscribers to access the Email Encryption.
  • New capabilities.  User Based Email Encryption uses digital signatures to define the sender’s identity. It helps guarantee message integrity, so you can safely send important documents, confidential information and contracts via email.
  • No upfront investment. Because it is a hosted solution, there are no upfront investments in hardware, certificates or other expensive yearly certificate renewals. You simply pay Intermedia a monthly fee per user.

What security technology is used for encryption?

Email Encryption uses standard-based technology, such as Public Key Infrastructure (PKI), S/MIME, and X.509 certificates to establish confidentiality, message integrity, and user authentication.

Can I send an email to anyone?

Yes, you can send an email to anyone.

How are scanned outgoing emails managed?

Policies can be configured to encrypt and send, return to sender or delete messages with insecure content. Comprehensive reporting lets you track and monitor outbound email activity.

How do recipients receive emails?

Recipients retrieve their messages from a secure Message Pickup Center, where they can read, reply, reply-to-all or forward encrypted messages.

Are attachments scanned?

Yes, attachments are scanned and policies are applied based on the content of the attachments.

What attachments does it support?

Email Encryption encrypts any MS Office document, .PDF file, image file, and almost any other popular file format.

Are emails from mobile devices encrypted?

Yes, policy-based Email Encryption supports emails sent from BlackBerry, iPhone, Android, Windows Mobile, and Symbian mobile devices.

Using the templates, Email Encryption subscribers are able to select from among a pre-built list of rules to determine which emails contact protected health information (PHI) and need to be encrypted.

Our HIPAA-compliant templates include pre-determined compliancy code sets, keywords, and policies built from the most current industry information, including:

  • Current Procedural Terminology (CPT) – American Medical Association’s CPT® codes and their descriptions are the most common form of communicating a health-related service
  • International Classification of Diseases (ICD) – The most common form of communicating a disease or condition. Both 9th and 10th Clinical Modifications are included (ICD 9/10 CM)
  • Health Care Common Procedure Coding System (HCPCS) – The common form of communicating ancillary services and supplies that are billed to third party insurers
  • National Drug Codes (NDC) – the common codes for medications that are prescribed or ordered. The Food and Drug Administration (FDA) and Centers for Medicare and Medicaid Services (CMS) mandate the format for NDC codes
  • Claims Adjustment Reason Codes and Remark Codes (CARC/RARC) – the most common standards used by health insurers to describe a payment made for a service line that has been submitted on a claim
  • Inpatient Fee For Service Codes (FFS) – These codes are used to designate inpatient fees incurred by a patient
  • National Provider Identifier (NPI) – NPI is a unique 10-digit code number that the CMS issues to registered healthcare providers in the US and is used by payers such as insurance companies to issue payment to the provider
  • US Social Security Numbers – Social Security Numbers have become a de facto form of national identification and historically used in health care related activities for ID purposes
  • Protected Health Information (PHI) – Keywords indicating a likely inclusion of some PHI

The templates are updated quarterly to ensure the most up-to-date HIPAA information is included.

The HIPAA templates are only available from 3 Run Single Media. They are included at no additional charge with our policy-based Email Encryption service.

For users: No additional software or plug-ins required. Send an email to any recipient. It’s just that easy.

For admins: You determine which regulations affect your business and which users you need to control. 3 Run Single Media hosts and manages the hardware and software to enable the encryption/decryption process and manage digital identities. We also provide a powerful web-based administration console from which you set, review and customize your organization’s privacy policies and administer users.

Jump-start your efforts with a wide variety of commonly used rules, dictionaries, and expressions or create complex rule chains to suit your organization’s unique needs. In addition to encrypting messages, you can monitor all messages and reject those that do not comply with company policies and procedures. Our analytics tool tracks every message that’s been processed and provides summary diagrams and detailed searchable reports.

As a critical piece of your company’s overall privacy strategy,

Easily define and enable email policies to reduce the risk of data loss and facilitate regulatory compliance measures such as HIPAA, SOX, GLBA, California’s Security Breach Notification Act, the Massachusetts Encryption Law, and many other regulations.

Reliability: "five nines" makes all the difference

Our cloud is purpose-built to deliver 99.999% up time with a financially backed SLA. Our Microsoft Certified architects and engineers make this happen by applying their deep expertise to our architecture, our world-class data centers, and the internet providers that connect our data centers to the world.

How would your business suffer if you couldn’t communicate with your customers or coworkers for a whole day? Or even half a day? With 3 Run Single’s five-nines up time guarantee, you won’t have to find out.

  • Security
  • Support
  • Reliability
  • Compliance
single-feature-01