Unified Legal Communications
When it Absolutely has to be SENT, TRACKED and VERIFIED!
CaseMail's secured unified legal communications service makes it easy for legal professionals to SEND, TRACK and VERIFY all their Electronic and Postal Communications directly from their computer or mobile device
CSend USPS First Class, Certified Mail, or FedEx Overnight Express Directly from Your Computer.
How it Works
Simply upload your Word or PDF document
Select Your Postage Type
Enter Recipients’ Info
Click Send and Check-Out
e-Signature Certificates of Authentication
CaseMail provides e-Signature Certificates of Authentication that can easily be download and printed directly from your computer. Certificates include copies of Signed Documents, Name of e-Signature Provider, Date and Time of Signing, Sender and Recipients’ IP Addresses.
CaseMail is recognized by the U.S.COURTS as an approved Bankruptcy Notice Provider pursuant to Fed. R. Bankr. P. 2002(g)(4) and 9001(9)
Auto Generated Certificates of Service
Easily download and print your U.S. Courts Approved Certificates of Service directly from your account. Includes copies of Mailed Documents, Date, Time, Postage Paid, Sender and Recipients Info and Addresses.
30 Day storage of Mailed Documents with Certificate of Mailing.
Optional lifetime storage available with upgraded account.
CaseMail Meets and Exceeds the Following Security & Compliance Standards:
HIPAA (Health Insurance Portability and Accountability Act)
FedRAMP (Federal Risk and Authorization Management Program)
FISMA (Federal Information Security Management Act of 2002)
SOC 1, SOC 2 and SOC 3 Reports
Cloud Security Alliance
Documents submitted and downloaded from CaseMail are secured by SSL based 256-bit encryption to secure your data.
CaseMail uses the most secure encryption available and supports both SHA-1 and SHA-2 algorithms.
CaseMail utilizes Business Compliance Network of secure Data and e-Print fulfillment centers located in Texas, Massachusetts, Kansas, Alabama, and California and exceeds industry best practices for logical and physical security. Comprehensive security services include firewall management with rule-set review, Intrusion Prevention Services (IPS), intrusion detection services, event management, internal and external vulnerability assessment, and system integrity monitoring and daily backups.