Traditional e-mail has the confidentiality level of a postcard. Any actor involved in its transport can easily read it. regimail offers a way to transform your e-mail into a confidential and auditable electronic letter. This works using your existing e-mail address and does neither allow regify or any third party to access your regimail.
After registration you can read and write regify e-mails on the web portal of your regify provider (no software download necessary) or you can use the easy-to-install regify client software. The software is available as an add-In for Windows (Microsoft Outlook, Lotus Notes, Thunderbird), as a standalone version for Windows, MacOS and Linux as well as an App for iPhone/iPad, Android devices and BlackBerry (up to Version 7.1). These options ensure that you can use regimail as you prefer.
Step 1: Sending
The regify technology encrypts your e-mail (message text, attachments) and compresses it before it sending it as an ordinary e-mail with an attachment. This attachment is a regify file with the encrypted contents of your original e-mail.
The respective encryption key is transmitted secured and encrypted to the regify clearing service via your regify provider.
Step 2: Receiving
In alignment with the regify clearing service, the regify provider of the addressee of your regify e-mail ensures that the recipient is the right person and will transfer the key.
As a result, the recipient can open the regify file and is able to display or store its contents. This is as simple as, for example, opening a pdf file with Acrobat Reader.
Step 3: Confirmation of receipt
When the key is delivered and the regify file opened, the recipient’s regify provider will notify the regify clearing service. The regify clearing service will notify your regify provider who in return, via e-mail will notify you u about delivery of the regify file. Confirmation of receipt is recorded independently of the notification e-mail.