Jatheon Technologies Inc.

Govern your communication and comply with regulation

Support CenterSales inquiries 1-888-528-4366

MENUMENU
  • Home
  • Products
    • Archive

      • Cloud Archive
      • On-Prem Archive

      Capture

      • Data Connectors

      New Data Sources

      • iMessage Archive
      • WhatsApp Archive

      By Type

      • Email Archiving
      • Social Media Archiving
      • Text Message Archiving
      • Chat Archiving
      • File Archiving

      By Industry

      • Education
      • Government
      • Financial Services
      • Healthcare

      By Business Needs

      • Ediscovery
      • Regulatory Compliance
      The Jatheon Advantage

      The Jatheon Difference

      Get the latest technology, reliability and an outstanding feature set coupled with 24/7 tech support to manage email, social media and mobile communications for compliance and ediscovery.

    • For: Healthcare
    • For: Financial Services
    • For: Government
    • WhatsApp Archiving
    • For: Education
    • Social Media Archiving
    • Regulatory Compliance
    • Ediscovery
    • Email Archiving
    • Cloud Archive
    • On-Premises Archive
    • Data Connectors
    • Text Message Archiving
    • Chat Archiving
    • File Archiving
  • Resources
      • Blog

        Weekly coverage of key trends in information archiving and ediscovery

      • Content Hub

        Whitepapers, guides, case studies, and infographics for regulated industries

      • Government Compliance Resource Pack

        Key resources for compliance and data management in government agencies.

      • Finance Compliance Resource Pack

        Top resources for FINRA, SEC and other compliance in the financial services industry.

      • Healthcare Compliance Resource Pack

        A collection of top resources for HIPAA compliance and effective data management.

      • Education Compliance Resource Pack

        Essential resources for educational compliance and data management optimization.

      The Jatheon Advantage

      The Jatheon Difference

      Stay informed about the latest developments in email archiving, social media monitoring and information governance. Read, watch and join the discussion.

    • Blog
    • Content Hub
    • Government Compliance Resource Pack
    • Finance Compliance Resource Pack
    • Healthcare Compliance Resource Pack
    • Education Compliance Resource Pack
  • Partners
      • Resellers
      • MSPs
      • AWS
      The Jatheon Advantage

      The Jatheon Difference

      Industry’s best archiving solutions for your clients in regulated industries and beyond.

    • MSPs
    • Resellers
  • Company
      • About
      • Press Releases
      • Careers
      • Contact
      The Jatheon Advantage

      The Jatheon Difference

      People love working and hanging out with us. Get in touch or join our team!

    • About
    • Careers
    • Press Releases
    • Contact
  • Support
  • Login
    • Customers

      Log into Jatheon Cloud to access your organization's email archive.

      Partners

      Log into Jatheon Cloud as a Managed Service Provider.

    • Customers
    • Partners
Login

Customers

Log into Jatheon Cloud to access your organization's email archive.

Partners

Log into Jatheon Cloud as a Managed Service Provider.

1-888-528-4366

orGet a Demo

Compliance Lessons from Major FINRA and SEC Texting Fines

May 14, 2026 By Natasa Djalovic Leave a Comment

blank

Key Takeaways Recordkeeping has shifted from a back-office task to one of the most consequential compliance risks financial firms face today. The most common violations stem from unarchived messages on encrypted messaging apps like WhatsApp, iMessage, and Signal, compounded by personal devices and remote work arrangements that put communications outside compliance controls. The enforcement net […]

Filed Under: Blog Tagged With: FINRA fines for texting, sec text messaging, sec texting, sec texting fines, sec texting rules, sec whatsapp fines, wechat compliance finra

10 Common FERPA Violation Examples and How to Avoid Them

May 13, 2026 By Natasa Djalovic Leave a Comment

FERPA violation examples

Key Takeaways FERPA violations are most often unintentional and caused by process gaps. Digital platforms, AI tools, and third-party vendors are the fastest-growing sources of FERPA risk. The Department of Education has never revoked federal funding for a FERPA violation, but corrective actions, state-level lawsuits, and reputational damage are real consequences. Prevention depends on retention […]

Filed Under: Blog Tagged With: example of an educational record according to ferpa, examples of ferpa violations, ferpa violation, FERPA violation examples, what is a ferpa violation

SMS Archiving for School Districts: Why Your District Probably Isn’t Capturing What You Think

April 30, 2026 By Natasa Djalovic Leave a Comment

sms archiving for school districts

Key Takeaways For schools, text messages are public records. Regardless of protocol, staff messages on district devices are subject to retention requirements, FOIA requests, and ediscovery. Archiving gaps are compliance gaps. Carrier archiving only captures SMS. iMessage and RCS, which are now default on most smartphones, bypass the carrier gateway entirely and are invisible to […]

Filed Under: Blog Tagged With: carrier sms archiving, rcs archiving, rcs compliance, school district text message retention, sms archiving education, sms archiving for school districts, text message archiving education, text message archiving for schools

HIPAA Encryption Requirements: The Complete Guide for Covered Entities and Business Associates

April 24, 2026 By Natasa Djalovic Leave a Comment

HIPAA encryption requirements; Table: HIPAA encryption compliance checklist

Key Takeaways HIPAA gives organizations flexibility on encryption, but the conditions for opting out are strict enough that most can’t meet them. NIST sets the technical bar: AES-256 for stored data, TLS 1.3 for data in motion. Getting encryption right can mean the difference between a contained incident and a public, regulated breach. Encryption is […]

Filed Under: Blog Tagged With: HIPAA compliance encryption requirements, HIPAA data encryption requirements, HIPAA encryption requirements

What Is PHI in Healthcare and How to Stay HIPAA Compliant

April 1, 2026 By Natasa Djalovic Leave a Comment

How to Stay HIPAA Compliant

Key Takeaways Protected Health Information (PHI) is health information that can identify an individual and is held or transmitted by a covered entity or business associate. The same data can be PHI in one context and not another. Who holds it matters as much as what it says. HIPAA’s 18 identifiers define what to remove […]

Filed Under: Blog Tagged With: electronic protected health information, examples of protected health information, phi compliance, phi compliance requirements, protected health information (phi), what is considered phi, what is considered phi under hipaa, what is not considered phi under hipaa, What Is PHI in healthcare, which of the following would be considered phi?

PII Compliance: How to Get It Right + Checklist

March 27, 2026 By Natasa Djalovic Leave a Comment

PI compliance

Key Takeaways PII compliance is a set of rules that govern how organizations collect, store, use, and dispose of personally identifiable information. There’s no single law that defines it. Depending on your industry and location, GDPR, HIPAA, CCPA, FERPA, FINRA rules, or several of these may apply. Organizations are expected to know what personal data […]

Filed Under: Blog Tagged With: an organization that fails to protect pii can face, identifying and safeguarding pii, pii compliance, pii compliance checklist, pii data discovery, pii protection, pii redaction

What Law Establishes PII? A Guide to U.S. PII Laws and Regulations

March 20, 2026 By Natasa Djalovic Leave a Comment

what law establishes pii

Key Takeaways U.S. privacy law has no single authority. PII protection is split across multiple federal, state, and international frameworks, and which ones apply to you depends on your industry, your data, and where you operate. State legislatures are filling the gaps that federal law leaves open. California led the way with CCPA, but the […]

Filed Under: Blog Tagged With: pii laws, pii regulations, pii rules, what law establishes pii

What Is PII? A Complete Guide to Personally Identifiable Information

March 13, 2026 By Natasa Djalovic Leave a Comment

what is pii

Key Takeaways PII (Personally Identifiable Information) is any data that can identify an individual, alone or in combination with other data. PII information is divided into two categories: direct identifiers (high-risk, identify someone on their own) and indirect identifiers (lower-risk individually, but identifying when combined). Major privacy laws governing PII include GDPR, HIPAA, and CCPA. […]

Filed Under: Blog Tagged With: PHI vs. PII, PII examples, pii information, what does PII stand for example of PII, what is considered PII, what is PII, what is pii data, Which types of records may contain PII

Downsides of Email Stubbing – 5 Reasons to Avoid It in Email Archiving

March 8, 2026 By Natasa Djalovic 4 Comments

Email stubbing risks in email archiving

Email stubbing sounds like a smart trade-off: move data out of your mailbox, keep a pointer in its place, and free up server space without disrupting the user experience. Clean, simple, efficient. The problem is that it rarely works out that way. Despite being widely adopted in the early days of email archiving, stubbing has […]

Filed Under: Blog Tagged With: email stubbing

Everything You Need to Know to Ensure FIPPA Compliance

January 16, 2026 By Natasa Djalovic Leave a Comment

FIPPA Compliance

If you work for a Canadian provincial or territorial public institution, you’ve likely come across the Freedom of Information and Protection of Privacy Act (FIPPA) and its implications for compliance. But what exactly does FIPPA involve, and how can your organization meet its obligations? In this article, you’ll learn: What FIPPA is and how it […]

Filed Under: Blog Tagged With: FIPPA, fippa meaning, fippa regulations

Next Page »
blank
Jatheon

Products

  • Cloud Archive
  • On-premises Archive
  • Data Connectors

Industries

  • Education
  • Financial
  • Government
  • Healthcare

New Data Sources

  • iMessage Archive
  • WhatsApp Archive

Solutions

  • Email Archiving
  • Social Media Archiving
  • Text Message Archiving
  • Chat Archiving
  • File Archiving

Resources

  • Content Hub
  • Webinars
  • Partner Program
  • Blog
  • Careers
  • App Privacy Policy

Compare us to

  • Barracuda
  • Google Vault
  • Intradyn
  • Microsoft 365
  • Mimosa Nearpoint
  • Unlimited Mailboxes
  • C2C Bridgehead
  • Message Logic
  • Gaggle
  • EMC SourceOne
  • Veritas Enterprise Vault

Contact Support

  • 1-647-426-1957
  • support@jatheon.com
  • Support Center

Contact Sales

  • 1-888-528-4366
  • sales@jatheon.com

Awards & Recognition

AWS partner
Capterra user reviews
GDPR compliant
HIPAA
ISO
SOC2

Connect With Us

CONNECT WITH US

Footer logo

Trust Privacy Policy Cookie Policy Terms & Conditions

Copyright © 2026 Jatheon Technologies. All Rights Reserved.

MENU logo
  • Home
  • Products
    • Cloud Archive
    • On-Premises Archive
    • Data Connectors
    • For: Education
    • For: Government
    • For: Healthcare
    • For: Financial Services
    • Email Archiving
    • Social Media Archiving
    • WhatsApp Archiving
    • Text Message Archiving
    • Chat Archiving
    • File Archiving
    • Ediscovery
    • Regulatory Compliance
  • Resources
    • Blog
    • Content Hub
    • Government Compliance Resource Pack
    • Finance Compliance Resource Pack
    • Healthcare Compliance Resource Pack
    • Education Compliance Resource Pack
  • Partners
    • Resellers
    • MSPs
  • Company
    • About
    • Press Releases
    • Careers
    • Contact
  • Support
  • Login
    • Customers
    • Partners