NEUROPSYCHIATRY and BEHAVIORAL NEUROLOGY | PSYCHOPHARMACOLOGY
FORENSICS | RESEARCH | CONSCIOUSNESS | PHILOSOPHY | BOOKS | LITERATURE
PERSPECTIVES | CLINICAL | DÉJÀ VU | INTERESTING AREAS | ETHICS | CONTACT

KEY ARTICLES (MEDICAL): HEAD INJURY | NARCOLEPSY | PAROXYSMAL DISORDERS | PRESCRIPTION PRINCIPLES | GENERIC SUBSTITUTION | TARDIVE DYSKINESIA | TESTING | DOUBLE BLIND | FAX INSECURITY

ENDURING INTEREST: GROUNDBREAKING PARADIGM SHIFTS | PHILOSOPHY | MORAL PHILOSOPHY | CONSCIOUSNESS | DEJA VU | GENIUS | SUBJECTIVITY | ZMAIL

Add HIPAA-security to your current email and cell phone with NMA ZSentry
Secure Email—Zmail

Comparison of different email security engines.

This is one of the most important articles on email security showing the four major software engines and the great advantage of the Zmail method.

Neppe, V. M. The email security-usability dichotomy: Necessary antinomy or potential synergism? Telicom. 2008; 21: 3, May-June, I5-31.

Our grateful thanks to Dr Vernon Neppe who holds the copyright on this article and Telicom, journal of the International Society for Philosophical Enquiry (www.thethousand.com)

Read Article

Secure email alternatives for HIPAA useCorporate E-mail Management

HIPAA compliance without Signing a Business agreement. (Provides HIPAA compliance without requiring a Business Associate Agreement to be signed: 

ZMAIL Privacy and Security Compliance Statement) 

Comparison of secure email technologies for HIPAA

What's needed: specific security solutions IT Security:  Dollar Decisions that Make Sense" Dr  E. Gerck.

Technical Comparative Review of Current Secure Email Technologies X.509/PKI, PGP, IBE and Zmail by Ed Gerck in Chapter 12, Corporate Email Management, S. J. Krishna and Elizabeth Raju (Ed.), ICFAI University Press, 2007, pp171-196, ISBN 81-314-12797 (2007).

Secure and Usable Emails: Read this Key Article. We now have available a way to solve the problems of identity and information theft (phishing and pharming) on the Internet. This advance is possibly one of the top four on the Internet—the Internet itself, the Secure Server, Internet Telephony and now secure and usable email (ZSentry mail).

Take Five in Internet Security (a very important article on the current limitations of internet security and the new paradigm for the future—the solution).  You can also respond to the blog.
Authors Dr Ed Gerck and Dr Vernon Neppe.

Other articles:

HIPAA

 

TECHNOLOGIES AVAILABLE

What's needed: specific security solutions IT Security:  Dollar Decisions that Make Sense" Dr  E. Gerck.

Technical Comparative Review of Current Secure Email Technologies X.509/PKI, PGP, IBE and Zmail by Ed Gerck in Chapter 12, Corporate Email Management, S. J. Krishna and Elizabeth Raju (Ed.), ICFAI University Press, 2007, pp171-196, ISBN 81-314-12797 (2007).

ZSENTRY TECHNOLOGY

 

Additional Materials:

D?j? Vu Links
Vortex Pluralism (Dr Neppe's philosophical theory)
Dr Neppe's classic Cry the Beloved Mind
Ethics and Philosophy


Copyright ©1997-2018 Pacific Neuropsychiatric Institute