Say It Privately™

ZSentry Cloud Security


Saying it privately is important as we increasingly communicate online instead of by telephone. Saying it privately, of course, includes keeping it private. For that, you also need to stop leaks, including online. With conventional IT, however, just deleting an email or even encrypting it may not keep it private.

People often forget that a text message or an email conversation is stored online in many different servers and can be leaked and replayed many years later, often without the authorization of any of the parties, and often with undesired consequences.

The Internet "cloud", with webmail and more online processing services, just increases the privacy risks. According to a 2010 survey commissioned by Microsoft, 90 percent of the general population and senior business leaders are concerned about the privacy and security of their personal data in the cloud. This concern is about a recognized real threat, as it was exemplified when NEWSWEEK’s Jessica Bennett asked a company to find out all they could about her. The firm found her Social Security number within 30 minutes.

Legally, your private information is not as protected as you may think. In many countries, the U.S. included, dataminers and commercial interests can claim marketing, affiliation, and other reasons to breach privacy. For example, the U.S. Court of Appeals for the Second Circuit has determined in 2010 that a state law restricting the commercial use of information relating to physician prescribing patterns is unconstitutional.

This decision principally challenges a restriction on access to otherwise private information. The legal basis was foreshadowed in a 1999 comment by Justice Scalia on the U.S. Constitution, that if people want the Right for Privacy, they will have to change the Constitution as nowhere does the Constitution address the right to privacy. Also according to Scalia, Free Speech is defended by the Constitution, and that makes the Right for Privacy very difficult to defend. A U.S. court, thus, would not rule in favor of your privacy rights if they create an impermissible restriction on commercial speech.

Your data privacy rights also vary in online versus local use (e.g., on an individual's USB token, or hard drive in the home or office), as well as "in transit" versus stored. Anyone familiar with the notorious privacy limitations of current laws written in the pre-Internet era, such as the 1986 U.S. Electronic Communications Privacy Act, knows that the individual's legal rights to privacy and protection from unreasonable search are starkly reduced for information stored online. Data that individuals store online, in cloud computing services such as webmail, receives a much lower level of privacy protection than data "in transit" or stored locally.

This means that unless you take effective control of your privacy rights, once information is sent, it will out.

Because your privacy needs it, ZSentry allows you to protect and tag your information, automatically and effectively. For example, you can issue a legally valid and worldwide enforceable copyright restriction to reduce potential exposure by using the ZSentry Self-Destruct Module set for a time of your convenience. The ZSentry technology then provides a clearly marked and effective perimeter, whithin which you assert your copyright and permissible use rules. This uses technology to go beyond technology, protecting also against copy disclosure (e.g., the so-called "camera attack") as explained further in the ZSentry Self-Destruct ModuleLearn more

ZSentry provides per-message encryption with digital signature and US NIST timestamp, protects user login with two-factor anti-phishing authentication, and uses the ZSentry Sans Target technology to eliminate online targets. ZSentry allay user concerns about their data stored online and can, immediately and effectively, enjoy the privacy rights as if they were to store the data locally.

How about messages that have not self-destructed yet? Leak attempts will not stop, and criminals will continue to break the law, but with ZSentry even an attempt to read your message or access your account is logged and verified. Every sender is identified and authenticated and, while pseudonyms can be used, every ZSentry message is traceable geographically, in time, and in traffic. Premium senders can identify their business, location, and telephone number, allowing people to be able to verify origin. As a sender, you can verify how, when, where and by whom your messages are read.

Gmail can send and receive ZSentry Mail with no plugin: ZSentry + Gmail Set upLearn more
Main Technical Notes
Overview   Key Features   ZSentry App   ZSentry Client   API   Smart IT   SAML & SSO
  Security   Usability   HIPAA & HITECH   Experience   Why ZSentry?   Red Flags   SUMMARY

Development and © by NMA

Trademarks and Copyrights as described in our Legal Statement. We protect Your Privacy.