1 2:00 p.m. EDT Thursday, March 26, 2015 www.privacyassociation.org

Similar documents
Dispatch: A Unique Security Solution

Account Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts

Mimecast Services for Outlook (MSO4)

E Mail Encryption End User Guide

Anti-Spam Configuration in Outlook 2003 INDEX. Webmail settings Page 2. Client settings Page 6. Creation date Version 1.2

1. How to Register Forgot Password Login to MailTrack Webmail Accessing MailTrack message Centre... 6

Frequently Asked Questions. Frequently Asked Questions SSLPost Page 1 of 31 support@sslpost.com

OneDrive in Office 365

Appendix A: Encrypting a File and / or Message

IQProtector Mobile Application

Webmail Using the Hush Encryption Engine

USC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9

GETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures

How to access and reply to an Egress Switch Secure free of charge. Opening a Switch Secure New User

Secur User Guide

Secure transmission of Protected Health Information (PHI)

Amazon WorkMail. User Guide Version 1.0

How to use Dropbox. What is Dropbox. Please read the University of Melbourne Guidelines on Dropbox and University Information prior to use.

SECURE COMMUNICATIONS PLAN Updated August 25, 2011

Secure Client Guide

Secure User Guide

SOOKASA WHITEPAPER SECURITY SOOKASA.COM

Secure Frequently Asked Questions

Google Apps for Education in Sapienza: a service for students. Francesco Barcellona Centro InfoSapienza

Vanguard Secure Service (VSES) User Guide

Receiving Secure from Citi For External Customers and Business Partners

Outlook Web App OWA Quick Guide. Getting you up to speed quickly.

Trusted Relationships. Sending Invitations. Sending Invitations from Outlook

How To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For

How To Set Up Your

cbox YOUR FILES GO MOBILE! FOR ANDROID SMARTPHONES AND TABLETS USER MANUAL

User Guide. Version 3.0 April 2006

Client Training Manual

U.S. Bank Secure Mail

Fax and Oracle Collaboration Suite. An Oracle White Paper August 2005

Realfax Service User Manual Version 4

UC Irvine Health Secure Mail Message Center

Electronic Communication In Your Practice. How To Use & Mobile Devices While Maintaining Compliance & Security

Student Mail Access. Introduction. Option One: Using an Client

IMF Tune Opens Exchange to Any Anti-Spam Filter

Encryption Recipient Guidelines

Quick-Start Guide

Outlook Data File navigate to the PST file that you want to open, select it and choose OK. The file will now appear as a folder in Outlook.

Secure Mail Registration and Viewing Procedures

How To Use The Gtokus Secure Mail System

Secure Client User Guide Receiving Secure from Mercantile Bank

SENDING S & MESSAGES TO GROUPS

Service Launch Guide (US Customer) SEG Filtering

Important Information


Guidance for sending and receiving an encrypted NHSmail

GUIDEWIRE. Introduction to Using WebMail. macrobatix. Learn how to: august 2008

Core Filtering Admin Guide

Outlook 2010 and 2013

Connecting to LUA s webmail

WatchDox SharePoint Beta Guide. Application Version 1.0.0

A NATURAL FIT. Microsoft Office 365 TM and Zix TM Encryption. By ZixCorp

Migration Manual (For Outlook 2010)

User manual VU-Mail Webmail Outlook Web App februari 2010


SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

When Data Loss Prevention Is Not Enough:

Adding Digital Signature and Encryption in Outlook

Welcome. 4 Common Security Best Practices. to the. Online Training Course

Instruction Manual for BicDroid QDocument

Stewart Secure User Guide. March 13, 2015

Secure Recipient Guide

Frequently Asked Questions (FAQs) IDBI Bank PayApt

Building an Effective Migration Communication Plan

How To Secure Your From Being Hacked On A Pc Or Mac Or Ipad (For Free) For A Long Time (For A Long Period Of Time) For Free (For Commercial) For Your Money (For Business) For The Long Term

Welcome to ncrypted Cloud!... 4 Getting Started Register for ncrypted Cloud Getting Started Download ncrypted Cloud...

Student Office 365 Outlook Web App OWA Quick Guide. Getting you up to speed quickly.

Alberni Valley IT Services Virtual domain information.

MICROSOFT EXCHANGE, OFFERED BY INTERCALL

. Service Option Description. Deltacom Product Management - updated 9/17/2007 1

Adobe Creative Cloud Desktop Applications for ETLA

Changes to Skillnet Group s. Outlook and Outlook Express Users

Reliable & Secure . Professional, Dependable, Complete Easy to Learn, Use and Grow

You can attach accounts to this domain name (eg. or which also increases your corporate branding.

Neat Cloud Service + Mobile App

User guide Business Internet features

Secure User Guide Receiving Secure from Merchants Bank

Archive Server for MDaemon Keep track of all your ! Save that information in a safe place and retrieve it in a snap.

State of South Carolina InfoSec and Privacy Career Path Model

Distribution List Manager User s Manual

Mac OS X User Manual Version 2.0

BOTTOM UP THINKING SETUP INSTRUCTIONS. Unique businesses require unique solutions CLIENT GUIDE

Exchange Mail Hosting

- - Learn More (Please click on one of the links below) What s new? What s changed?

Welcome to Sookasa. Getting Started Guide for SafeMonk users

April 14. Product Suite. one_mail, one_storage, one_archive, one_sync, one_mobile. Version 2.1 Client Services

Transcription:

Your Data, Your Rules: How to Regain Control of Your Digital Communications 1 2:00 p.m. EDT Thursday, March 26, 2015

Welcome & Introductions Today s Speaker Dan Kruger Founder and Chief Architect Absio Corporation 2

What enables private communication? Making digital communications reasonably private requires the same things as analog communication: 1. Control of who can approach you to talk 2. Control of who can participate in a conversation 3. Control of stored communications 4. Constraints (usually costs) on redistribution 3

Email communications Emails are copies of digital objects that: can be transmitted by anyone, to anyone, via an open public network, by relaying copies from server to server, any one of which can retain a copy, to and from end user devices you don t own or control, by people that can easily lie about who they are. 4

Partial compensation We ve been adding things to email that partially compensate: Spam filters Inbound and outbound inspection Transmission encryption Endpoint and server storage Policies and procedures Compensations produce repetitious inconvenience, not privacy Compensations are not solutions 5

Current State Product examples Integrates with Outlook? Protects email on my device? Recipient device? Protects email in transit? Protects email on server/cloud? How/when can I access email? Device Encryption - Bitlocker - SafeGuard - FileVault No - Yes - No No No Not an email technology Encrypted Connection - CipherPost - Zix Corp Yes - No - No Partially Partial protection (most providers have access to your content) Website (online only) Secure Webmail - Hushmail - Google end to end No - No - No Partially Partial protection (most providers have access to your content) Website (online only) File Sharing Services - Dropbox - Watchdox Partial - No - No N/A -Partial protection (most providers have access to your content) Not an email technology Partial control does not accomplish the goal 6

Solutions 1. Enable invitation and verification 2. Remove meaning from digital objects, except for the people that should have them every copy, everywhere 3. Make unauthorized acquisition useless 4. Make security automatic and invisible 5. Add controls and cost to redistribution: force unauthorized redistribution to analog 6. Make exercising control simple 7

Key features Add on for Outlook 2010, 2013 Standalone Windows app Automatic encryption, all the time, everywhere Connection by invitation Easy download and installation Free for casual use (250MB) Individual and business service plans ios and Android in June 8

Dispatch for Outlook: Inbox 9

Dispatch for Outlook: Compose 10

Dispatch for Outlook: Invitation Email 11

Dispatch for Outlook: Registration 12

Dispatch for Outlook: Connection Request 13

Dispatch for Outlook: Contacts 14

Dispatch for Windows: Inbox 15

Administrator 16

Future This year: Mobile platforms SMTP and Exchange email integration Forms and signatures Shared folders Usability features Archive management Single sign on Next year: SDK (privacy can be built into any application) More Absio applications 17

Conclusion Nothing significant has changed about email problems or compensations since the IAPP was founded in 2000. A real solution has been engineered and delivered to the marketplace. Barriers to adoption are low. This changes the game. How does that change what you do and recommend? 18

Questions & Answers Contact: Dan Kruger Founder and Chief Architect Absio Corporation dan.kruger@absio.com (720) 836-1222 www.absio.com 19

For a copy of these presentation slides and to view the recording of this web conference, please visit: https://absio.com/events

Web Conference Participant Feedback Survey Please take this quick (2 minute) survey to let us know how satisfied you were with this program and to provide us with suggestions for future improvement. Click here: IAPP Web Conference Participant Feedback Survey Thank you in advance! For more information: 21

Attention IAPP Certified Professionals: This IAPP web conference may be applied toward the continuing privacy education (CPE) requirements of your CIPP/US, CIPP/E, CIPP/G, CIPP/C, CIPT or CIPM credential worth 1.0 credit hours. IAPP-certified professionals who are the named participant of the registration will automatically receive credit. If another certified professional has participated in the program but is not the named participant then the individual may submit for credit by submitting the continuing education application form at www.privacyssociation.org. Continuing Legal Education Credits: The IAPP provides certificates of attendance to web conference attendees. Certificates must be self-submitted to the appropriate jurisdiction for continuing education credits. Please consult your specific governing body s rules and regulations to confirm if a web conference is an eligible format for attaining credits. Each IAPP web conference offers either 60 or 90 minutes of programming. 22

For questions on this or other IAPP Web Conferences or for a copy of the slide presentation, please contact: Dave Cohen, CIPP/US Knowledge Manager International Association of Privacy Professionals (IAPP) Dave@privacyassociation.org 603.427.9200 x 221 23