ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    O365 and encrypted mail to other email systems

    IT Discussion
    office365 audit hipaa ocr
    9
    169
    66.2k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DashrenderD
      Dashrender @JaredBusch
      last edited by

      @JaredBusch said in O365 and encrypted mail to other email systems:

      @Dashrender said in O365 and encrypted mail to other email systems:

      @scottalanmiller said in O365 and encrypted mail to other email systems:

      Frame it more like this, at least to yourself:

      TLS Pros Compared to Zix: Cheaper, Standard, Nearly all customers get an effortless experience.

      Zix Pros Compared to TLS: None

      Disagree Zix does have one Pro: able to send notice of desire to communicate, but TLS isn't available, so you must use another more painful means.

      Regarding failure to send TLS. Just because it fails does not mean you have no way to communicate the need to contact the office. You have a couple of options here.

      With the sole purpose of being used to send an email to failed parties telling them that you were unable to securely email them and that they need to contact the office, you can do this:
      2.a Setup a simply Gmail/Outlook.com account for the practice
      2.b Setup a basic Linux box and make use of the built in Postfix to send email (via some application probably) from your own domain. Basically a second email server that does not have the TLS restriction.
      2.c Possibly have a single email account on your Exchange server that is immune form the TLS requirements. Not even sure if this is possible when you set TLS as wildcard required.

      I tend to agree, I don't think Exchange will allow you to make a single account immune.

      and yes, an external account to your main domain would be the way to solve this, for the notice at least, then you have to find another way to actually get the data to them.

      1 Reply Last reply Reply Quote 0
      • coliverC
        coliver
        last edited by

        What happens if the customer gives you a wrong phone number for fax? Or if they give you a wrong address? What is your responsibility to delivering the message if you don't have the correct information?

        scottalanmillerS DashrenderD 2 Replies Last reply Reply Quote 1
        • DashrenderD
          Dashrender @scottalanmiller
          last edited by

          @scottalanmiller said in O365 and encrypted mail to other email systems:

          @Dashrender said in O365 and encrypted mail to other email systems:

          @scottalanmiller said in O365 and encrypted mail to other email systems:

          @Dashrender said in O365 and encrypted mail to other email systems:

          Disagree Zix does have one Pro: able to send notice of desire to communicate, but TLS isn't available, so you must use another more painful means.

          Nope, you can make rules for TLS that allow you to send notification but not the payload.

          You just repeated what I said. Now, since Zix doesn't give a shit about TLS, it only ever uses it's secure portal (to the best of my knowledge) all secure messages are sent using their painful method, but a notice about that message is sent via to the client over whatever, TLS or not is available to the server.

          But you can do that with Exchange, too. But never have the uselessly painful portion.

          That's interesting - so you know that exchange can have a second transport option created that will send a generic notice to a NON TLS recipient and not send the original email? That would be cool. Still need a solution for the actual message content at that point, but that's for another discussion.

          scottalanmillerS 1 Reply Last reply Reply Quote 0
          • DashrenderD
            Dashrender @coliver
            last edited by

            @coliver said in O365 and encrypted mail to other email systems:

            Does the email bounce back if it can't make a secure connection?

            I would assume the Exchange user in this case would get a delivery denied notice.
            haven't confirmed yet.

            1 Reply Last reply Reply Quote 0
            • DashrenderD
              Dashrender @bogdan.moldovan
              last edited by

              @bogdan.moldovan said in O365 and encrypted mail to other email systems:

              @Dashrender I think that the gold standard here is S/MIME.

              It requires that you (as a sender) have an S/MIME Private Key and signed Certificate and know your recipient's Public Key/Certificate.
              It requires that the receiver has matching S/MIME Private Key and signed Certificate to the Public Key/Certificate that the sender had when sending the email.

              The S/MIME Private Keys / Certificates have to be configured on each device where the senders and receivers are sending / receiving email from/to.

              Everything else, IMHO, is non-secure!

              The S/MIME Certificates and Private Keys and be acquired individually by users or distributed to users from your own managed PKI.

              Thanks for playing, this is not part of a viable solution.

              bogdan.moldovanB 1 Reply Last reply Reply Quote 0
              • scottalanmillerS
                scottalanmiller @coliver
                last edited by

                @coliver said in O365 and encrypted mail to other email systems:

                What happens if the customer gives you a wrong phone number for fax? Or if they give you a wrong address? What is your responsibility to delivering the message if you don't have the correct information?

                And unlike email which is "untappable" locally, fax is trivial to tap at either end. Even if you secure your own end (you can't) you have zero control over the other end and their fax can be intercepted because they even know that you tried to send one.

                1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @Dashrender
                  last edited by

                  @Dashrender said in O365 and encrypted mail to other email systems:

                  @scottalanmiller said in O365 and encrypted mail to other email systems:

                  @Dashrender said in O365 and encrypted mail to other email systems:

                  @scottalanmiller said in O365 and encrypted mail to other email systems:

                  @Dashrender said in O365 and encrypted mail to other email systems:

                  Disagree Zix does have one Pro: able to send notice of desire to communicate, but TLS isn't available, so you must use another more painful means.

                  Nope, you can make rules for TLS that allow you to send notification but not the payload.

                  You just repeated what I said. Now, since Zix doesn't give a shit about TLS, it only ever uses it's secure portal (to the best of my knowledge) all secure messages are sent using their painful method, but a notice about that message is sent via to the client over whatever, TLS or not is available to the server.

                  But you can do that with Exchange, too. But never have the uselessly painful portion.

                  That's interesting - so you know that exchange can have a second transport option created that will send a generic notice to a NON TLS recipient and not send the original email? That would be cool. Still need a solution for the actual message content at that point, but that's for another discussion.

                  I know that it has "TLS Transport Rules" so that it only requires TLS in certain circumstances.

                  DashrenderD 1 Reply Last reply Reply Quote 0
                  • DashrenderD
                    Dashrender @coliver
                    last edited by

                    @coliver said in O365 and encrypted mail to other email systems:

                    What happens if the customer gives you a wrong phone number for fax? Or if they give you a wrong address? What is your responsibility to delivering the message if you don't have the correct information?

                    In the case of a wrong fax - 99.9% of the time it will fail, so the data would go no where. As for Postal Mail - it's in a sealed envelope, and assuming the incorrect receiver put a return to sender, wrong address label on it, we'd get it back intact.

                    So in most cases there is little to no concern. Mail isn't covered by the HIPAA as fair as digital data goes, so it's not my concern..

                    scottalanmillerS 3 Replies Last reply Reply Quote 0
                    • scottalanmillerS
                      scottalanmiller @Dashrender
                      last edited by

                      @Dashrender said in O365 and encrypted mail to other email systems:

                      In the case of a wrong fax - 99.9% of the time it will fail, so the data would go no where. As for Postal Mail - it's in a sealed envelope, and assuming the incorrect receiver put a return to sender, wrong address label on it, we'd get it back intact.

                      Um yeah, postal mail doesn't work that way 😉

                      1 Reply Last reply Reply Quote 0
                      • scottalanmillerS
                        scottalanmiller @Dashrender
                        last edited by

                        @Dashrender said in O365 and encrypted mail to other email systems:

                        Mail isn't covered by the HIPAA as fair as digital data goes, so it's not my concern..

                        Nor is faxing, it's analogue.

                        1 Reply Last reply Reply Quote 0
                        • bogdan.moldovanB
                          bogdan.moldovan @Dashrender
                          last edited by

                          @Dashrender said in O365 and encrypted mail to other email systems:

                          @bogdan.moldovan said in O365 and encrypted mail to other email systems:

                          @Dashrender I think that the gold standard here is S/MIME.

                          It requires that you (as a sender) have an S/MIME Private Key and signed Certificate and know your recipient's Public Key/Certificate.
                          It requires that the receiver has matching S/MIME Private Key and signed Certificate to the Public Key/Certificate that the sender had when sending the email.

                          The S/MIME Private Keys / Certificates have to be configured on each device where the senders and receivers are sending / receiving email from/to.

                          Everything else, IMHO, is non-secure!

                          The S/MIME Certificates and Private Keys and be acquired individually by users or distributed to users from your own managed PKI.

                          Thanks for playing, this is not part of a viable solution.

                          You're welcome! I understand the hint ;)!

                          DashrenderD 1 Reply Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller @Dashrender
                            last edited by

                            @Dashrender said in O365 and encrypted mail to other email systems:

                            Mail isn't covered by the HIPAA as fair as digital data goes, so it's not my concern..

                            Depends, do you have an account number on the paper? That would be digital data.

                            1 Reply Last reply Reply Quote 0
                            • DashrenderD
                              Dashrender @scottalanmiller
                              last edited by

                              @scottalanmiller said in O365 and encrypted mail to other email systems:

                              @Dashrender said in O365 and encrypted mail to other email systems:

                              @scottalanmiller said in O365 and encrypted mail to other email systems:

                              @Dashrender said in O365 and encrypted mail to other email systems:

                              @scottalanmiller said in O365 and encrypted mail to other email systems:

                              @Dashrender said in O365 and encrypted mail to other email systems:

                              Disagree Zix does have one Pro: able to send notice of desire to communicate, but TLS isn't available, so you must use another more painful means.

                              Nope, you can make rules for TLS that allow you to send notification but not the payload.

                              You just repeated what I said. Now, since Zix doesn't give a shit about TLS, it only ever uses it's secure portal (to the best of my knowledge) all secure messages are sent using their painful method, but a notice about that message is sent via to the client over whatever, TLS or not is available to the server.

                              But you can do that with Exchange, too. But never have the uselessly painful portion.

                              That's interesting - so you know that exchange can have a second transport option created that will send a generic notice to a NON TLS recipient and not send the original email? That would be cool. Still need a solution for the actual message content at that point, but that's for another discussion.

                              I know that it has "TLS Transport Rules" so that it only requires TLS in certain circumstances.

                              Eh? you mean every circumstance?

                              I suppose, IF, and only IF Exchange's transport rules can act upon things within the message itself, then a rule could be made - when a message subject line contains secure that the message can only be sent via TLS otherwise fail it. But I haven't seen that type of option available to the Rules.

                              1 Reply Last reply Reply Quote 0
                              • DashrenderD
                                Dashrender @bogdan.moldovan
                                last edited by

                                @bogdan.moldovan said in O365 and encrypted mail to other email systems:

                                @Dashrender said in O365 and encrypted mail to other email systems:

                                @bogdan.moldovan said in O365 and encrypted mail to other email systems:

                                @Dashrender I think that the gold standard here is S/MIME.

                                It requires that you (as a sender) have an S/MIME Private Key and signed Certificate and know your recipient's Public Key/Certificate.
                                It requires that the receiver has matching S/MIME Private Key and signed Certificate to the Public Key/Certificate that the sender had when sending the email.

                                The S/MIME Private Keys / Certificates have to be configured on each device where the senders and receivers are sending / receiving email from/to.

                                Everything else, IMHO, is non-secure!

                                The S/MIME Certificates and Private Keys and be acquired individually by users or distributed to users from your own managed PKI.

                                Thanks for playing, this is not part of a viable solution.

                                You're welcome! I understand the hint ;)!

                                Sorry I'm a bit pissed off right now because of the Faxing things. it's nothing against you. While the idea in and of itself is sound, it's completely not usable in a normal corporate environment. I can't get my wife to use a new chat client, let alone expect my front desk person to know how to find someone's Public Key, download/install it into their email client (which is local only, so when they sit a new machine, they have to do it again and again), then use that key to send via s/mime.

                                bogdan.moldovanB 1 Reply Last reply Reply Quote 0
                                • bogdan.moldovanB
                                  bogdan.moldovan @Dashrender
                                  last edited by

                                  @Dashrender said in O365 and encrypted mail to other email systems:

                                  @bogdan.moldovan said in O365 and encrypted mail to other email systems:

                                  @Dashrender said in O365 and encrypted mail to other email systems:

                                  @bogdan.moldovan said in O365 and encrypted mail to other email systems:

                                  @Dashrender I think that the gold standard here is S/MIME.

                                  It requires that you (as a sender) have an S/MIME Private Key and signed Certificate and know your recipient's Public Key/Certificate.
                                  It requires that the receiver has matching S/MIME Private Key and signed Certificate to the Public Key/Certificate that the sender had when sending the email.

                                  The S/MIME Private Keys / Certificates have to be configured on each device where the senders and receivers are sending / receiving email from/to.

                                  Everything else, IMHO, is non-secure!

                                  The S/MIME Certificates and Private Keys and be acquired individually by users or distributed to users from your own managed PKI.

                                  Thanks for playing, this is not part of a viable solution.

                                  You're welcome! I understand the hint ;)!

                                  Sorry I'm a bit pissed off right now because of the Faxing things. it's nothing against you. While the idea in and of itself is sound, it's completely not usable in a normal corporate environment. I can't get my wife to use a new chat client, let alone expect my front desk person to know how to find someone's Public Key, download/install it into their email client (which is local only, so when they sit a new machine, they have to do it again and again), then use that key to send via s/mime.

                                  That's OK. Whenever you would like to deep-dive into this, let me know. True end to end security is not for the average front desk person, I agree. Nor should they need it! On the other hand, in my experience, when true end-to-end security is required, the overhead of properly setting things up becomes an acceptable issue, if not a non-issue.

                                  scottalanmillerS DashrenderD 2 Replies Last reply Reply Quote 0
                                  • scottalanmillerS
                                    scottalanmiller @bogdan.moldovan
                                    last edited by

                                    @bogdan.moldovan said in O365 and encrypted mail to other email systems:

                                    @Dashrender said in O365 and encrypted mail to other email systems:

                                    @bogdan.moldovan said in O365 and encrypted mail to other email systems:

                                    @Dashrender said in O365 and encrypted mail to other email systems:

                                    @bogdan.moldovan said in O365 and encrypted mail to other email systems:

                                    @Dashrender I think that the gold standard here is S/MIME.

                                    It requires that you (as a sender) have an S/MIME Private Key and signed Certificate and know your recipient's Public Key/Certificate.
                                    It requires that the receiver has matching S/MIME Private Key and signed Certificate to the Public Key/Certificate that the sender had when sending the email.

                                    The S/MIME Private Keys / Certificates have to be configured on each device where the senders and receivers are sending / receiving email from/to.

                                    Everything else, IMHO, is non-secure!

                                    The S/MIME Certificates and Private Keys and be acquired individually by users or distributed to users from your own managed PKI.

                                    Thanks for playing, this is not part of a viable solution.

                                    You're welcome! I understand the hint ;)!

                                    Sorry I'm a bit pissed off right now because of the Faxing things. it's nothing against you. While the idea in and of itself is sound, it's completely not usable in a normal corporate environment. I can't get my wife to use a new chat client, let alone expect my front desk person to know how to find someone's Public Key, download/install it into their email client (which is local only, so when they sit a new machine, they have to do it again and again), then use that key to send via s/mime.

                                    That's OK. Whenever you would like to deep-dive into this, let me know. True end to end security is not for the average front desk person, I agree. Nor should they need it! On the other hand, in my experience, when true end-to-end security is required, the overhead of properly setting things up becomes an acceptable issue, if not a non-issue.

                                    It's for HIPAA, not for security.

                                    1 Reply Last reply Reply Quote 2
                                    • DashrenderD
                                      Dashrender @bogdan.moldovan
                                      last edited by

                                      @bogdan.moldovan said in O365 and encrypted mail to other email systems:

                                      That's OK. Whenever you would like to deep-dive into this, let me know. True end to end security is not for the average front desk person, I agree. Nor should they need it! On the other hand, in my experience, when true end-to-end security is required, the overhead of properly setting things up becomes an acceptable issue, if not a non-issue.

                                      it's debatable if HIPAA requires this for PHI transmission or not.

                                      Currently, this lot believes that it is not, but only transmission from your email server to their email server, after that it's on them to secure the data.

                                      But, when looking at Opportunistic TLS vs Forced TLS - currently I don't know of a way to make Exchange do this on the fly, say based on content in a message. There are add-ons to Exchange that enable this functionality, but the discussion here is if TLS along would solve the problem.

                                      Scott's now claiming (I think at least) that sending emails over non TLS, non encrypted connections over the internet is completely fine, and does not put you at any legal risk from HIPAA - he believe this because faxing does not require any type of encryption. And While I understand his argument, I simply don't agree - and personally can't wait for a court case to see the fireworks - Scott's lawyer would claim faxing has no security, therefore email doesn't require any.

                                      JaredBuschJ bogdan.moldovanB 2 Replies Last reply Reply Quote 0
                                      • JaredBuschJ
                                        JaredBusch @Dashrender
                                        last edited by

                                        @Dashrender said in O365 and encrypted mail to other email systems:

                                        @bogdan.moldovan said in O365 and encrypted mail to other email systems:

                                        That's OK. Whenever you would like to deep-dive into this, let me know. True end to end security is not for the average front desk person, I agree. Nor should they need it! On the other hand, in my experience, when true end-to-end security is required, the overhead of properly setting things up becomes an acceptable issue, if not a non-issue.

                                        it's debatable if HIPAA requires this for PHI transmission or not.

                                        Currently, this lot believes that it is not, but only transmission from your email server to their email server, after that it's on them to secure the data.

                                        But, when looking at Opportunistic TLS vs Forced TLS - currently I don't know of a way to make Exchange do this on the fly, say based on content in a message. There are add-ons to Exchange that enable this functionality, but the discussion here is if TLS along would solve the problem.

                                        Scott's now claiming (I think at least) that sending emails over non TLS, non encrypted connections over the internet is completely fine, and does not put you at any legal risk from HIPAA - he believe this because faxing does not require any type of encryption. And While I understand his argument, I simply don't agree - and personally can't wait for a court case to see the fireworks - Scott's lawyer would claim faxing has no security, therefore email doesn't require any.

                                        What you need to do is stop conflating everything. You are trying to mix all the pieces up when they are all different issues.

                                        All you end up with is a big heaping pile of steaming shit.

                                        No matter what @scottalanmiller's opinions are of faxing and email they have nothing to do with the topic at hand. He thankfully started a separate topic to handle that discussion.

                                        You want to send PHI via email. HIPAA auditors state that it must be encrypted. Your only concern is that you require encryption for delivery. Once delivered the PHI is not under your control and is not something you need have any concern over.

                                        The easiest and most cost effective way to do this is to require TLS at your MTA.

                                        As with any solution, there will be people that are unable to get the message. Unlike other services where they have to try and deal with 3rd party issues, your users will know immediately that the PHI was unable to be sent because you will receive a failure notice from your MTA.

                                        At this point you have many options to handle the failure. You can call, email non PHI information on a non TLS connection, send a letter, or go to their home/office and tell them in person that they have PHI data that you are unable to send to them.

                                        That is all there is to it.

                                        1 Reply Last reply Reply Quote 1
                                        • JaredBuschJ
                                          JaredBusch
                                          last edited by

                                          Read what I just wrote and do not add anything into it.

                                          In one of the prior posts you jumped from required TLS and a backup MTA to saying it was all not going to work because you cannot figure out some method to automagically route messages.

                                          That is conflating two completely different topics. You need to stop doing that.

                                          DashrenderD 1 Reply Last reply Reply Quote 0
                                          • DashrenderD
                                            Dashrender @JaredBusch
                                            last edited by

                                            @JaredBusch said in O365 and encrypted mail to other email systems:

                                            Read what I just wrote and do not add anything into it.

                                            In one of the prior posts you jumped from required TLS and a backup MTA to saying it was all not going to work because you cannot figure out some method to automagically route messages.

                                            That is conflating two completely different topics. You need to stop doing that.

                                            I don't believe I was conflating anything, as you like to say - but I definitely agree that there are multiple issues that need to be resolved.

                                            I never wrote, but had considered the solutions to the FORCE TLS option that you presented.

                                            JaredBuschJ 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 5
                                            • 6
                                            • 7
                                            • 8
                                            • 9
                                            • 8 / 9
                                            • First post
                                              Last post