We are continuously working to ensure the best experience possible for both senders and recipients, as devices change and evolve, as well as user needs. If you have a comment or question, please click to request a Support Ticket >>
Click to read an article, click to close
Popular Questions (more at Frequent Questions)
Can Gmail use ZSentry to send and read encrypted email?
Yes. There is nothing to install or download, and no plugins. Gmail and Google Apps can send (and read) secure email directly from the Google web interface — to send securely you can just click Send. Also works for Yahoo Mail, Live, and other addresses. Go to ZSentry + Google >>Where is the search function?
You can send and read secure email as easily as regular email also from Mail clients such as Outlook, Apple Mail, and Thunderbird, on Windows, Mac, iPad, iPhone, Android, and Linux. Go to ZSentry + Mail Clients >>
Click Submit Search to send your request. Please add any comments that may help us provide search results that are likely to be more relevant to you.Why do I need to protect email?
Organizations have a legal obligation to prevent privacy breaches, and not just for medical records (HIPAA). And as people often painfully learn, information will out.Where can I find a list of the most common questions?
The only protection you may have with regular email is if it is no longer available on the web after it is received. This protection is broken, however, in network disk caches, and with webmail such as Gmail, Yahoo, and Hotmail. It is also broken at your ISP, when your message is stored waiting retrieval, even if you use an SSL service such as Google's Postini to deliver the message to your mailbox.
And it is also broken at your laptop and desktop, which are vulnerable to theft, hackers, and (as it often happens and you are not even aware of) someone who can use your computer when you are not looking.
And, of course, that protection exists less and less today, as more and more email messages are routinely cached for traffic, service and surveillance reasons. Information can also be leaked, at any of these points.
The most common questions for mobile, web, and desktop use are answered in the Home Page, with additional entries here and in the Frequent Questions page.What is account self-management?
ZSentry's most critical user account management functions are provided for self-use 24/7 online using ZSentry App, for example at the User Area >>Can I use ZSentry anytime, anywhere?
NOTE: You are the only holder of the login credentials (your ZSentry Usercode and your ZSentry Password) that grants access to your account. ZSentry does not store your keys, password and usercode anywhere, not even encrypted, so they are not at risk. Our personnel do not have and cannot access your login credentials. Our personnel will NEVER ask you for your login credentials, for any reason whatsoever.
Account Reset: In case of loss or compromise you can reset your ZSentry Account by using the corresponding button in ZSentry App.
Credential Recovery: Available using ZSentry App, for Premium Users and Managers. This is useful in case the password cannot be remembered. To use this service, you must first set it up with a Security Question & Answer, which are used to encrypt your Private Recovery Record. ZSentry does not have access to the Security Q & A after it is set by you. You may keep the Private Recovery Record with yourself or safely store it in your encrypted and de-identified ZSentry area (default). Without your security question and answer, the Private Recovery Record is useless.
Support Ticket: Please request a Support Ticket to let us know quickly that you need assistance. Also available for free Basic users.
Yes. ZSentry users can login or just read ZSentry messages anytime, from anywhere they desire, including from computers they are using temporarily.
ZSentry is a zero-footprint interface. The access security at ZSentry does not depend on the user's IP (Internet Protocol) number or localization. ZSentry does not use client side Java, or ActiveX controls. Encrypted session cookies (that are deleted when the browser closes) may be disabled by the user before login, or by unchecking the box for "Allow 1-Click Access" before submitting the Usercode.
We do not expect problems with users using any current web browser and email programs. In case of doubt about your web browser, try the Browser Test function in ZSentry App.
Is ZSentry FFIEC compliant? Can I use ZSentry for ecommerce and online banking?
Yes. The ZSentry Interface and the data viewed or generated for transmission constitute fully compliant transactions under FFIEC. This service employs the ZSentry technology for two factor authentication of users, including a proven anti-phishing solution.Is ZSentry HIPAA compliant?
For additional information, see the Compliance Statement
Yes. The ZSentry Interface and the data viewed or generated for transmission constitute fully compliant standard transactions under HIPAA. Compliance is provided on a technical level, guarding data integrity, confidentiality and availability. Each Health organization utilizing these services must be HIPAA compliant if they are characterized as a Covered Entity (CE) under HIPAA. Other Health organizations or persons may or may not be exempt from HIPAA. The ZSentry Service protects Protected Health Information (PHI) and other sensitive information by using ZSentry technology and a variety of technologies and methods described herein.Can I use ZSentry Mail to vote in US public elections?
Further, the ZSentry Service is not made aware of PHI and is, thus, not required to sign a Business Associate Agreement for its customers.
For additional information, see the Compliance Statement
Yes, if you are one of the seven million US voters abroad (UOCAVA voters) and you vote in a state that allows electronic ballot transmission. You can also use zmail to register to vote. This is important news for everyone, and can introduce more convenience and security in election methods anywhere in the world. A security study is available upon request.
|Main Technical Notes|