De-Mail
De-Mail () is a German e-government communications service that makes it possible to exchange legal electronic documents between citizens, agencies, and businesses over the Internet. The project was originally called Bürgerportal and has been implemented by the German government in cooperation with private business partners in an effort to reduce the communication costs of public administration and companies. The project was announced in 2008 and was approved by the Bundestag and the Bundesrat in early 2011. The De-Mail law (which serves as the legal basis for the service) went into effect on May 2, 2011. : De-Mail Law, May 2nd 2011 Background With the introduction of De-Mail, the German legislation implemented the[...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Certified Email
Certified email (known as ''Posta elettronica certificata'' in Italy, or ''PEC'' in short) is a special type of email in use in Italy, Switzerland, Hong Kong and Germany. Certified email is meant to provide a legal equivalent of the traditional registered mail, where users are able to legally prove that a given email has been sent and received by paying a small fee. Registered mail is mainly used in Italy, but there are present efforts to extend its legal validity according to the framework of the European Union. Description A certified email can only be sent using a special Certified Email Account provided by a registered provider. When a certified email is sent, the sender's provider will release a receipt of the successful (or failed) transaction. This receipt has legal value and it includes precise information about the time the certified email was sent. Similarly, the receiver's provider will deliver the message in the appropriate certified email account and will then re ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
E-government
E-government (known for electronic government) involves utilizing technology devices, such as computers and the Internet, for faster means of delivering public services to citizens and other persons in a country or region. E-government offers new opportunities for more direct and convenient citizen access to government and for government provision of services directly to citizens. E- government involves digital interactions across various levels and stakeholders (C2G), between governments and other government agencies (G2G), between government and citizens (G2C), between government and employees (G2E), and between government and businesses/commerces (G2B). E-government delivery models can be broken down into the following categories:Jeong Chun Hai @Ibrahim. (2007). ''Fundamental of Development Administration.'' Selangor: Scholar Press. This interaction consists of citizens communicating with all levels of government (city, state/province, national, and international), facil ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
United Internet AG
United Internet AG is a global Internet services company headquartered in Montabaur, Rhineland-Palatinate, Germany. The company is structured in two business areas, ''Access'' and ''Applications,'' and has a total of 16 brands and numerous subsidiaries. The well-known brands under the umbrella of United Internet AG include 1&1, Ionos, Fasthosts, GMX, WEB.DE and 1&1 Versatel. United Internet AG is listed in MDAX, TecDAX – going public in 1998 (under the name 1&1 Internet AG &Co. KGaA). United Internet comprises over 27 million customer accounts and runs business in over 30 locations across the world. History The history of the Group goes back to 1&1 EDV-Marketing GmbH, which was founded in 1988 by Ralph Dommermuth and Wendelin Abresch as a service provider for marketing and advertising. In the 1990s, the company grew into a large corporation that offered web hosting packages as well as its own online service that allowed users to dial up to the Internet. In March 1998, t ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Technology In Society
Technology is the application of conceptual knowledge to achieve practical goals, especially in a reproducible way. The word ''technology'' can also mean the products resulting from such efforts, including both tangible tools such as utensils or machines, and intangible ones such as software. Technology plays a critical role in science, engineering, and everyday life. Technological advancements have led to significant changes in society. The earliest known technology is the stone tool, used during prehistory, followed by the control of fire—which in turn contributed to the growth of the human brain The human brain is the central organ (anatomy), organ of the nervous system, and with the spinal cord, comprises the central nervous system. It consists of the cerebrum, the brainstem and the cerebellum. The brain controls most of the activi ... and the development of language during the Pleistocene, Ice Age, according to the cooking hypothesis. The invention of the ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Secure Messaging
Secure messaging is a server-based approach to protect sensitive data when sent beyond the corporate borders, and it provides compliance with industry regulations such as HIPAA, GLBA and SOX. Advantages over classical secure e-mail are that confidential and authenticated exchanges can be started immediately by any internet user worldwide since there is no requirement to install any software nor to obtain or to distribute cryptographic keys beforehand. Secure messages provide non-repudiation as the recipients (similar to online banking) are personally identified and transactions are logged by the secure email platform. Functionality Secure messaging works as an online messaging service. Firstly, users enroll in a secure messaging platform. Then, the user logs into their account by typing in their username and password (or strong authentication) similar to a web-based email account. Out of a message center, the messages can be sent over a secure SSL-connection or via other equal ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Registered Mail
Registered mail is a postal service in many countries which allows the sender proof of mailing via a receipt and, upon request, electronic verification that an article was delivered or that a delivery attempt was made. Depending on the country, additional services may also be available, such as: * a chain of custody, where the posted item has its details recorded in a register to enable its location to be tracked, sometimes with added insurance to cover loss; *a return receipt, called an avis de réception, which provides a postcard or electronic notification with the date of delivery and recipient signature; *restricted delivery, which confirms that only a specific person or authorized agent will receive the mail, and; *certified mail, in the United States. Background Traditionally, registered mail was a manual process which gave rise to a great variety of distinctive postal markings, like handstamps, and usage of registration labels. Many countries have issued special post ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Email Authentication
Email authentication, or validation, is a collection of techniques aimed at providing verifiable information about the origin of email messages by validating the Domain name#Purpose, domain ownership of any message transfer agents (MTA) who participated in transferring and possibly modifying a message. The original base of Internet email, Simple Mail Transfer Protocol (SMTP), has no such feature, so forged sender addresses in emails (a practice known as email spoofing) have been widely used in phishing, email spam, and various types of frauds. To combat this, many competing email authentication proposals have been developed. three had been widely adopted – Sender Policy Framework, SPF, DKIM and DMARC. The results of such validation can be used in automated email filtering, or can assist recipients when selecting an appropriate action. This article does not cover user authentication of email submission and retrieval. Rationale In the early 1980s, when Simple Mail Transfer Protoc ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
EIDAS
The eIDAS Regulation (for "electronic IDentification, Authentication and trust Services") is an regulation (European Union), EU regulation with the stated purpose of governing "electronic identification and trust service provider, trust services for electronic transactions". It passed in 2014 and its provisions came into effect between 2016 and 2018. The eIDAS Regulation was fundamentally amended by Regulation (EU) 2024/1183 of the European Parliament and of the Council of the European Union, Council of 11 April 2024. The main purpose of the amendment is to introduce a voluntary digital wallet (European Digital Identity) that Member state of the European Union, member states must issue at the request of European Union citizenship, EU citizens. Description The eIDAS-Regulation oversees electronic identification and trust services for electronic transactions in the European Union's European Single Market, internal market. It regulates electronic signatures, electronic transactio ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
E-Government
E-government (known for electronic government) involves utilizing technology devices, such as computers and the Internet, for faster means of delivering public services to citizens and other persons in a country or region. E-government offers new opportunities for more direct and convenient citizen access to government and for government provision of services directly to citizens. E- government involves digital interactions across various levels and stakeholders (C2G), between governments and other government agencies (G2G), between government and citizens (G2C), between government and employees (G2E), and between government and businesses/commerces (G2B). E-government delivery models can be broken down into the following categories:Jeong Chun Hai @Ibrahim. (2007). ''Fundamental of Development Administration.'' Selangor: Scholar Press. This interaction consists of citizens communicating with all levels of government (city, state/province, national, and international), facil ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
1&1 Internet
Ionos SE ( iː'ɔnɔs">International_Phonetic_Alphabet.html" ;"title="nowiki/>International Phonetic Alphabet">iː'ɔnɔs proper spelling IONOS) is a German Internet service provider that is known for its Web hosting service, web hosting, Domain name, domain and cloud computing products. The company is part of the United Internet, United Internet Group and operates in several continental European countries, (excluding Portugal) and North America. Its headquarters are located in the western part of Germany in Montabaur, a small town situated in Rhineland-Palatinate. The Internet access business (DSL and mobile communications) was spun off into 1&1 Telecommunication. History 1&1 (at the time known as 1&1 Internet) was founded in Germany in 1988. The company developed data center and network architecture to enable internet access, becoming one of the first web hosting companies. Ten years later, in 1998, 1&1 became a shareholder of Schlund+Partner. In 2000, the company changed ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
GMX Mail
GMX Mail is a free, advertising-supported email service provided by Global Mail eXchange or Global Message eXchange in Germany. Users may access received GMX mail via webmail, or using POP3 or IMAP4 protocols. Mail is sent using SMTP. Founded in 1997, GMX is a subsidiary of Ionos SE, a stock-listed company in Germany,GMX: ''About'' retrieved 12 May 2011 and a sister company to Ionos and Internet. In addition to an email address, each GMX account includes a Mail Collector, Address Book, Organizer, and File Storage. Every user can register up to 10 individual GMX email addresses. Popup ads are displayed to all users, includin ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
End-to-end Encryption
End-to-end encryption (E2EE) is a method of implementing a secure communication system where only communicating users can participate. No one else, including the system provider, telecom providers, Internet providers or malicious actors, can access the cryptographic keys needed to read or send messages. End-to-end encryption prevents data from being read or secretly modified, except by the true sender and intended recipients. Frequently, the messages are relayed from the sender to the recipients by a service provider. However, messages are encrypted by the sender and no third party, including the service provider, has the means to decrypt them. The recipients retrieve the encrypted messages and decrypt them independently. Since third parties cannot decrypt the data being communicated or stored, services that provide end-to-end encryption are better at protecting user data when they are affected by data breaches. Such services are also unable to share user data with governm ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |