Blog

Litigation Counsel Guide: How to Prove Service of Court Documents by Email – Update

December 07, 2012 / in Blog / by Zafar Khan, RPost CEO

This posting should serve as a reference guide for process servers or lawyers who need to prove service by email. (1) Serve by email

RPost Granted Three Patents on Most Fundamental Method of Tracking Email Delivery & Opening

July 24, 2012 / in Blog / by Zafar Khan, RPost CEO

RPost has been granted three additional patents (US Patent numbers 8,224,913; 8,209,389 and 8,161,104) which comprehensively cover systems and methods service providers use to track email opening, delivery or failure using server logs and web beacons – technology novel in 1999 when RPost first filed for the patents, but widely used today.

Litigation Counsel Guide: How to Prove Service of Court Documents by Email

July 11, 2012 / in Blog / by Zafar Khan, RPost CEO

This posting should serve as a reference guide for process servers or lawyers who need to prove service by email. (1) Request permission to serve by email

RPost Registered Email™ services Meet the ETSI Registered Electronic Mail Standard

June 24, 2012 / in Blog / by Zafar Khan, RPost CEO

This posting may serve as a useful reference to RPost Registered Email™ services compliance with the European Telecommunications Standards Institute (ETSI) Technical Specification (TS) produced by ETSI Technical Committee Electronic Signatures and Infrastructures (ESI) on the multi-part standards documentation covering Registered Electronic Mail (REM); Architecture, Formats, Policies and Profiles. ETSI claims to be officially recognized […]

Would Metadata Cleaning Spoil Your Evidence?

May 03, 2012 / in Blog / by Zafar Khan, RPost CEO

In Dr. Ball’s blog, he smartly notes: “Application metadata resides within the file and moves with the file, not changing unless the contents of the file are altered. System metadata resides outside the file and can be altered without impacting the contents of the file. Hashing the file hashes its contents, not information about the file. That is, you only hash what’s stored inside the file, not its system metadata.” He also […]