Using a trail to find one’s way seems pretty natural. There should be no surprise, then, that computers use trails to maintain a record of system activity – processes, activity, applications, and even email exchanges are stored in activity logs that are easily rendered into audit trails.
Audit trails can be used as a support for regular system operations and also as a kind of insurance policy. As insurance, audit trails are maintained but are not used unless needed, such as if there are suspected problems or external requests for information. As a support for operations, audit trails are used to help system administrators ensure that the system or resources have not been harmed by hackers, insiders, or technical problems.
Protected Trust customers have just such a trail available to them on demand, in real time. Clients can know who, when, and where every action is performed on each protected message through the ever-available proof-of-delivery log. Besides that, if clients are audited (for internal or external compliance, or say by a court action) they can prove the whole electronic message's life span. If an auditor asks about what happened with a specific message the client can prove the actions using the proof-of-delivery log. Further, because of the integrated nature of the log (e.g. it’s virtually tamper-proof) it is admissible in court.
This isn’t a new feature. The log has been dutifully recording trails since the user first opened their account, without any need to activate it. The audit function doesn’t cost anything extra to the customer either.
To access the proof of delivery:
- Login on your account
- Go to Dashboard
- Click on Sent Items
- Select a message
- On Message Administration click on View Proof of Delivery Log.