About Desired Email

Company History

When email first came along, it revolutionized the way we communicate. Messages and documents could be shared instantly, across any distance. As email grew so did its problems, malicious software, security breaches, and spam which turned what was once a brilliant tool into a source of frustration and risk. The convenience was being overshadowed by constant threats.

That is why we knew something had to change. We are a small group of tech visionaries, privacy advocates, and determined users who came together with one bold goal: to fix email for good. We saw that traditional email services were failing their users, failing to protect their privacy, their security, and their peace of mind. We refused to accept that. So we set out to design something completely new. Desired Email is a closed network, intentionally built this way to make the system more secure. By keeping the network closed, we dramatically reduce external threats and vulnerabilities. After years of self-funded development, the result is Desired Email, a revolutionary service that redefines what email should be. Our system is so forward-thinking; it is now patent-pending.

One of our most game changing features is Selective Messaging, which gives you complete control over your inbox. You decide who can send you emails and what types of content they can include. The days of being bombarded by spam or unwanted messages are over. Desired Email ensures that only the emails you want will ever reach your inbox. Imagine an inbox free from distractions where you control what comes in. With Desired Email, that is no longer a dream, it is reality.

But stopping spam was just the beginning. We built Desired Email with security as its foundation. Our system prevents harmful software by blocking executable files from running in our system, protecting you from viruses, malware, and ransomware. With Desired Email, you can use email with total confidence, knowing that your data is shielded from the cyber threats that plague other services.

Privacy is another pillar of our platform. With Desired Email, every message is encrypted end-to-end. This means that only you and the person you are communicating with can read the messages. Even the "To" and "From" fields are encoded for extra protection. Your data is also encrypted while it is in transit and at rest, ensuring it is secure at every step. What sets us apart is that we never store your encryption keys. Those stay with you and your recipient, not us. We are fully compliant with HIPAA and PCI standards, so you can trust that your privacy is protected to the highest degree. And unlike many other providers, we will never sell your data. Your information belongs to you and you alone.

We also made a visionary decision to use Database Storage instead of Raw Storage. This means your data is stored in a highly organized system, making it easier to manage, more secure, and much faster to access. Unlike raw storage, which leaves data sitting in open file systems, our database storage ensures that your information is more protected from unauthorized access. The result is a faster, more reliable email experience that is built on efficiency and security.

After five years of hard work and completely self-funding our efforts, we are proud to announce that Desired Email will officially launch across the United States on January 1, 2026. Pre-Orders will be available for a limited time. For those looking for even more control, we offer a private label version of Desired Email, so your organization can have a custom branded email experience with all the benefits we offer.

This is not just another email service. Desired Email is a complete reinvention of what email can be. With us, you regain control over your communication, your privacy is guaranteed, and your inbox is free from the noise and risks that dominate other platforms.

We are not just building an email service. We are creating a movement. We are visionaries who saw the broken system and committed ourselves to fixing it. We invite you to be part of this change, to experience the freedom and security Desired Email brings. Join us in making email great again.

Contact Us

We are excited to hear from you!

Whether you have questions, want more information, or are ready to get started, we are here to help.

At Desired Email, we truly value your satisfaction and we want to make sure you feel supported every step of the way.

Do not hesitate to reach out to us at support@desiredemail.com.

Our friendly team welcomes the opportunity to assist you.

PCI Compliance

Evaluation of Desired Email's PCI DSS Compliance

Desired Email is a secure communication platform that also processes payments and interacts with sensitive cardholder data. To comply with the Payment Card Industry Data Security Standard (PCI DSS), Desired Email follows the 12 main requirements that ensure cardholder data is handled safely and securely. These standards are set by the PCI Security Standards Council (PCI SSC), which was founded by major payment card networks including Visa, MasterCard, American Express, Discover, and JCB. The council sets and maintains the PCI DSS to protect payment card transactions and cardholder information. Below is an analysis of how Desired Email complies with each requirement.

1. Install and Maintain a Secure Network and Systems
PCI DSS Requirement 1
Desired Email uses a secure hosting platform through Amazon Web Services (AWS) and implements strong firewall configurations to protect cardholder data, ensuring unauthorized users cannot access payment systems.

2. Do Not Use Vendor-Supplied Defaults for System Passwords and Other Security Parameters
PCI DSS Requirement 2
Desired Email ensures that all systems handling cardholder data do not use default passwords or settings. Unique credentials and secure configurations are mandatory for all payment systems.

3. Protect Stored Cardholder Data
PCI DSS Requirement 3
Desired Email does not store any cardholder data on its servers. All payment information is processed securely through Stripe Checkout, which manages the storage and protection of cardholder data.

4. Encrypt Transmission of Cardholder Data Both in Transit and at Rest
PCI DSS Requirement 4
Desired Email ensures that all payment-related communications are encrypted using TLS encryption, securing cardholder data both in transit and at rest. This applies to all communications between customers and payment processing systems.

5. Protect All Systems Against Malware and Regularly Update Anti-Virus Software or Programs
PCI DSS Requirement 5
Desired Email ensures that all systems used in payment processing are protected by up-to-date anti-malware software. Regular updates and monitoring are performed to guard against threats.

6. Develop and Maintain Secure Systems and Applications
PCI DSS Requirement 6
Regular updates are applied to all systems and applications to address vulnerabilities and ensure that Desired Email's payment systems stay compliant with the latest security standards.

7. Restrict Access to Cardholder Data by Business Need to Know
PCI DSS Requirement 7
Desired Email limits access to sensitive payment data, with only authorized personnel who need access to perform specific tasks being granted permission. The access control system ensures restricted data handling

8. Identify and Authenticate Access to System Components
PCI DSS Requirement 8
All users accessing the payment system are authenticated with unique credentials, ensuring that only authorized personnel can interact with system components handling sensitive data.

9. Restrict Physical Access to Cardholder Data
PCI DSS Requirement 9
As Desired Email does not store cardholder data directly, physical access is managed by Stripe. However, all infrastructure used to process payments ensures that physical access to systems handling cardholder data is restricted and secure.

10. Track and Monitor All Access to Network Resources and Cardholder Data
PCI DSS Requirement 10
Desired Email, through Stripe, tracks and monitors access to all systems that handle cardholder data. Logs and monitoring systems are in place to review and trace any interactions with payment data.

11. Regularly Test Security Systems and Processes
PCI DSS Requirement 11
Desired Email performs regular security assessments and vulnerability scans to ensure that systems handling payment data are secure. This includes regular tests to ensure compliance with PCI DSS standards.

12. Maintain a Policy That Addresses Information Security for Employees and Contractors
PCI DSS Requirement 12
Desired Email maintains strict security policies, requiring all employees and contractors to adhere to information security practices, including proper handling of sensitive payment data.

Conclusion:
Desired Email is PCI DSS compliant through its use of Stripe Checkout, which handles all cardholder data securely. By implementing strong encryption for data both in transit and at rest, access controls, and regular security monitoring, Desired Email meets all 12 PCI DSS requirements, as set by the PCI Security Standards Council (PCI SSC), to ensure that sensitive payment information is protected during all transactions.

Desired Email's Glossary of Terminology

This glossary is designed to educate our subscribers about terms and their meanings. Understanding these terms provides insight into Desired Email's features and security measures. This is a living document that will be continuously updated with new terms, helping you stay informed and protected as our platform evolves.


TermMeaning
AcceptedYou are open to receiving messages from this user.
AlgorithmA set of step-by-step instructions or rules designed to perform a specific task or solve a problem. In computing and security, algorithms are used to process data, such as encoding and encryption, by following precise methods to transform information securely or efficiently.
Amazon Web Services (AWS):This is a comprehensive cloud computing platform provided by Amazon. AWS offers a wide range of cloud services, including storage, computing power, networking, databases, and security, enabling businesses to scale and manage their operations efficiently in the cloud. Many organizations use AWS for secure data storage, application hosting, and cloud infrastructure management.
Application:A software program designed to perform specific tasks for a user. Applications can range from email platforms like Desired Email to word processors, mobile apps, and more. Applications are typically installed on devices or accessed via the web.
Application Hosting:This is the process of running and managing software applications on remote servers instead of local computers. It allows users to access the application over the internet, providing scalability, security, and performance without needing to manage the underlying hardware. Services like AWS are commonly used for application hosting.
ART (Authorization Request Token):An ART is a unique 64-character message that acts as a secure link between two users as part of the Selective Messaging feature. It contains all the necessary details to connect accounts safely. The recipient can review information from the sender, and then decide whether to accept or deny the connection.
  • Recipient:   The individual who receives the ART message and has the authority to accept or deny the connection request.
  • Sender: The individual initiating the connection, using the 64-character ART message to request communication with the recipient.
Statuses: (Manage how you interact with others by using the following statuses)
  • Accepted: You are open to receiving messages from this user.
  • Blocked: You permanently block all messages and prevent future connection attempts from this user.
  • Denied: You completely stop all messages and remove this user from your connections.
  • Reported: You notify Desired Email of any suspicious activity from the Sender, such as SPAM or phishing attempts.
  • Suspended: You temporarily stop receiving messages from this user.
Attachment:A file or document that is included with an email message, allowing the recipient to download or view additional content beyond the email's text. Attachments can be various file types such as documents, images, audio, videos, or other digital media.
Audio:Sound files, such as voice recordings or music, which can be sent as attachments to convey auditory information.
Auto Sorting:A feature that automatically organizes incoming messages into categories or folders based on predefined criteria, such as sender, subject, or message content, helping users manage their inbox efficiently.
Binary Code:A system of representing digital data using two symbols, typically 0 and 1. Each 0 or 1 is called a bit, and combinations of these bits form the foundation of all digital systems, including computers, smartphones, and email communication. Binary code is the most basic form of data representation used to process and store information electronically.
Binary Media:Binary media refers to file types that include non-text content such as images, videos, audio, and interactive content. These are typically used for rich media content that can be attached or embedded within emails.
Bit:The smallest unit of digital data in computing represented as either a 0 or a 1 in binary code. Bits are the building blocks of all digital communication and processing.
Blocked:You permanently block all messages and prevent future connection attempts from this user.
Byte:A unit of digital data typically made up of eight bits. Bytes are used to measure file sizes and storage capacity, with larger files being measured in:
  • Kilobyte (KB): 1,024 bytes, commonly used for small files like text documents.
  • Megabyte (MB): 1,024 KB or about one million bytes, used for larger files such as images or short videos.
  • Gigabyte (GB): 1,024 MB or about one billion bytes, commonly used for storage space in email systems, larger media files, and software.
  • Terabyte (TB): 1,024 GB or about one trillion bytes, used to measure exceptionally large data storage.
Blacklist:This is a list of email addresses or domains that are blocked from sending messages. These addresses are identified as SPAM or potentially harmful, and emails from them will not reach your inbox.
Closed Messaging System:This is a feature that restricts email communication to only those within the network, significantly reducing the likelihood of receiving SPAM, phishing, or other external threats.
Closed Network:This is a private network where only authorized users within the system can send and receive messages. This setup enhances security by limiting external access and reducing the chances of unauthorized communications.
Cloud Infrastructure Management:This is the process of overseeing and controlling cloud-based resources, such as servers, storage, and networking. This includes monitoring performance, optimizing usage, ensuring security, and managing costs. Cloud infrastructure management enables businesses to efficiently scale their operations and maintain the reliability of their cloud services.
Cloud Services:On-demand computing services, such as storage, databases, networking, and software, delivered over the internet. Cloud services allow users and businesses to access technology resources remotely without having to own or maintain physical hardware.
Data:Information that is stored, processed, or transmitted electronically. Data can include text, numbers, images, audio, videos, and other digital content. In the context of Desired Email, data refers to the information contained in emails, attachments, metadata, and other forms of communication that are securely stored and transferred within the platform.
Data at Rest:Information that is stored on a device, server, or cloud system and not being actively transmitted. Desired Email ensures that data at rest is securely encrypted and encoded to protect against unauthorized access.
Data Encryption & Encoding:These security measures transform your messages into formats that only the intended recipient can access. This protects your information from being viewed by unauthorized individuals.
Data in Transit:This is the information that is being transferred over a network. Desired Email encrypts and encodes data in transit to safeguard it while moving between servers or devices.
Data Retention:These policies and practices govern how long email data is stored and available. Desired Email offers secure storage with policies that respect user privacy and compliance with data retention regulations.
Database:A structured collection of data stored electronically. Databases allow for the efficient storage, retrieval, and management of large amounts of information, often used for secure data storage, processing, and organization.
Database Storage:A structured method of storing data that allows for efficient organization, retrieval, and management. In Desired Email, database storage is used to securely store emails, attachments, and user data in a way that allows for quick access and improved performance. Unlike raw storage, database storage provides enhanced security, scalability, and the ability to manage large amounts of information more effectively.
Decode:This is the process of converting encoded or compressed data back into its original, readable form. In the context of emails, decoding allows the recipient to view the message or attachment in its intended format.
Decryption:The process of converting encrypted data back into its original, readable form. Decryption requires the correct encryption key to access the data, ensuring that only authorized users can view sensitive information.
Denied:You completely stop all messages and remove this user from your connections.
Dependent Account:Linked to a Premium Account, the Dependent Account comes with 4 GB of database storage. It has permissions set by the Premium Account holder, allowing for tailored control. This is a lower-priced but effective subscription account ideal for minors and most mid to lower-tier employees.
Digital Data:Information that is stored, transmitted, or processed in a digital format using binary code (comprising 0s and 1s). Digital data includes text, images, videos, audio, and other multimedia elements that are stored on electronic devices or transmitted across networks. It forms the basis for all electronic communications, including email.
Domain:This is a unique name that identifies a website or service on the internet. In email, the domain is the part of an email address that comes after the "@" symbol, representing the email provider (e.g., desiredemail.com).
Email:This is a method of exchanging digital messages over the internet. An email consists of a message body, which may include text, images, or links, along with sender and recipient information, and can include attachments.
Embedded:This refers to hardware or software that is integrated into a system or device for a specific function. In technology, embedded systems are often designed to perform specialized tasks within larger systems.
Encoded:This is the process of converting information or data into a different format using a specific algorithm, often for transmission or storage. Desired Email secures sensitive metadata, such as "To" and "From" fields, by encoding it. This ensures that even if intercepted, the information is not easily readable, adding an extra layer of privacy alongside encryption for data in transit and at rest.
Encryption:A security process that transforms information into an unreadable format using complex algorithms, ensuring that only authorized individuals with the correct decryption key can access the data. Encryption is used to protect sensitive information from unauthorized access, both while in transit and at rest.
Encryption Keys:The cryptographic keys used to encode and decode messages, ensuring only authorized recipients can access the information. Desired Email does not store encryption keys on its servers.
Executable File:This is a type of file that contains a program or script that can be run directly by a computer's operating system. When opened, an executable file conducts specific tasks or instructions encoded within it.
of Executable Files:
  • .exe: Commonly used on Windows to launch applications or install software.
  • .bat: A batch file that executes a series of commands in the Windows command line.
  • .com: An older format used in DOS to execute machine code.
  • .sh: A script file used in Unix and Linux systems to run shell commands.
  • .app: A macOS package used to run applications on Apple devices.
  • .msi: A Microsoft Installer file used to install software on Windows.
  • .jar: A Java archive file that can be executed with the Java Runtime Environment.
Desired Email, executable files are blocked from launching on the platform to prevent malware and other security risks.
False Negative:An incorrect assessment where a malicious or unwanted email is mistakenly classified as safe, allowing it to pass through the filters undetected.
False Positive:This is an incorrect identification of a harmless email as SPAM or a security threat, causing it to be mistakenly blocked or flagged.
Gigabyte (GB):This is a unit of digital information storage equivalent to 1,024 megabytes (MB). In the context of email and data storage, GB refers to the amount of space available for saving emails, attachments, and other data. More GBs provide greater storage capacity for users.
Hardware:This is the physical components of a computer system, such as the processor, memory, storage devices, and networking equipment. Hardware forms the foundation on which software and digital processes operate.
HIPAA (Health Insurance Portability and Accountability Act):A United States law designed to protect sensitive health information from being disclosed without the patient's consent or knowledge. It ensures that organizations handling personal health data follow strict privacy and security standards.
Hypertext Markup Language, Version 4 (HTML4):A standard language used to create and structure content on the web, such as text, images, links, and forms. HTML4 was introduced in 1997 and became widely used for building websites. It defines how elements like headings, paragraphs, tables, and multimedia content are displayed in a web browser. Although newer versions like HTML5 have since been developed with more advanced features, HTML4 remains a foundational web technology. It supports the basic structure of web pages but lacks some of the multimedia and interactive capabilities present in HTML5.
Images:The visual representations such as photographs, illustrations, or digital graphics that can be included as attachments or embedded within emails.
Interactive Content:Media that allows users to engage or interact with the content, such as clickable buttons, forms, or multimedia presentations, enhancing user experience within an email.
JavaScript ES6 (ECMAScript 6 or ECMAScript 2015):A major version of JavaScript, the programming language used to create interactive and dynamic content on websites. ES6 introduced significant new features to JavaScript, improving its functionality and usability for developers.

Some of the key features include:
  • Arrow Functions: A shorter syntax for writing functions.
  • Classes: A more structured way to define objects and inheritance in JavaScript, making the language more intuitive for object-oriented programming.
  • Modules: Allows developers to break code into reusable parts and import/export them across different files.
  • Template Literals: A new way to work with strings, making it easier to embed variables and expressions.
  • Let and Constraints (Const): New ways to declare variables with better scope management compared to the older variable keyword.
  • Promises: A tool to manage asynchronous operations (e.g., fetching data from a server) in a cleaner and more efficient way.
ES6 made JavaScript more powerful and efficient, enabling developers to create more complex and responsive web applications with cleaner and more manageable code. It is widely supported by modern browsers.
Kilobyte (KB):This is a unit of digital information storage equivalent to 1,024 bytes. Kilobytes are typically used to measure the size of very small files or portions of data, such as text documents or small images.
Local Area Network (LAN):This is a network that connects computers and devices within a limited geographic area, such as a home, office, or building. LANs allow devices to share resources, such as printers, files, and internet connections. LANs are typically faster and more secure than wide-area networks (WANs) due to their localized nature. They can be wired (using Ethernet cables) or wireless (using Wi-Fi).
Living Document:A document that is continuously updated and revised to include the most current information. As Desired Email evolves, the glossary will be regularly updated with new terms and features to reflect ongoing changes.
Malware:Malicious software designed to harm your device or steal data.

Common types include:
  • Ransomware: Malware that locks or encrypts your data and demands payment for its release.
  • Viruses: Programs that can replicate and spread to other devices, often causing damage.
  • Worms: Malicious programs that spread across networks by exploiting vulnerabilities.
Malware Protection:This explains the measures taken to prevent malicious software. Desired Email blocks executable files from running on our system, protecting you from ransomware and other threats.
Megabyte (MB):This is a unit of digital information storage equivalent to 1,024 kilobytes (KB) or about one million bytes. MB is commonly used to measure the size of smaller files, such as documents or images, and email attachments.
Metadata:This is the data that provides information about other data. It summarizes basic details about data, such as the author, creation date, file size, or "To" and "From" fields in emails. Metadata helps organize, find, and understand data, but it does not include the content of the data itself. In Desired Email, metadata is often encoded to protect sensitive information such as sender (From) and recipient (To) details.
Multimedia Presentation:This is a type of presentation that combines different forms of content such as text, images, audio, video, and interactive elements to convey information in an engaging and dynamic way. Multimedia presentations can be used in emails to enhance communication and the user experience.
Network:This is a system of interconnected computers, servers, and devices that exchange data and share resources. Networks can be local (LAN) or global (internet), allowing users to communicate and access information over connected systems.
Operating System (OS):This is the fundamental software that manages a computer's hardware and software resources, enabling other programs and applications to run. The operating system controls tasks such as memory allocation, file management, and user interaction. Common operating systems include Windows, macOS, Linux, and mobile platforms like Android and iOS. In the context of Desired Email, the platform is compatible with certain operating systems that support specific web browsers and features.
Permissions:The level of access or control granted to a user over certain features or information within Desired Email. Permissions determine what actions a user can take, such as sending messages, viewing data, or managing account settings.
Phishing:Fraudulent attempts to steal sensitive information, such as passwords or bank details, by pretending to be a trustworthy source.
Portal Account:Connected to a Premium or Dependent Account, the Portal Account offers 2 GB of database storage and enables secure communication with up to one hundred clients, contractors, patients, or vendors. While Portal clients can communicate with their Premium or Dependent Account holder, they cannot connect with other Portal clients. Though it lacks Selective Messaging, this account is a very inexpensive and secure solution for professionals managing several contacts.
Premium Account:As the highest-level subscriber account, the Premium Account offers 6 GB of database storage, enhanced security features, and priority support. It is perfect for parents or business executives, providing the ability to set permissions for Dependent Accounts and manage multiple users with ease. Premium users enjoy greater control over messaging and advanced management tools.
Private Label:A feature that allows businesses to customize their Desired Email platform with their own branding, offering a personalized, professional touch.
Protocols:Protocols are standardized rules and procedures that govern how data is transmitted, received, and interpreted across networks. They ensure that devices, software, and systems can communicate effectively and securely, regardless of differences in hardware or platforms. Networking protocols are essential for maintaining the integrity, speed, and security of data transmission.
Ransomware:This is Malware that locks or encrypts your data and demands payment for its release.
Ransomware Protection:These are measures taken to prevent malicious software that encrypts a user's data and demands payment for its release. Desired Email prevents attachments from executing when clicked to prevent such threats from entering the system.
Raw Storage:This is a basic form of data storage where information is saved without any organization or structure. Unlike database storage, raw storage lacks indexing and management capabilities, making it more difficult to retrieve and organize data efficiently. It is typically less secure and less scalable compared to structured methods like database storage, which is why Desired Email uses database storage to offer better performance, security, and data management for its users.
Reported:You notify Desired Email of any suspicious activity from the Sender, such as SPAM or phishing attempts.
Rich Media Files:These are files that contain multimedia elements such as images, videos, audio, and interactive content. These files provide a more engaging experience than text-only files and are commonly used in email attachments to enhance communication.
  • Audio:Sound files, such as voice recordings or music, which can be sent as attachments to convey auditory information.
  • Images:Visual representations such as photographs, illustrations, or digital graphics that can be included as attachments or embedded within emails.
  • Interactive Content:Media that allows users to engage or interact with the content, such as clickable buttons, forms, or multimedia presentations, enhancing user experience within an email.
  • Videos:Multimedia files that display moving images, often accompanied by sound, providing dynamic visual content in emails or attachments.
Scalability:The ability of Desired Email to grow with you, adapting to the increasing needs of businesses.
Secure Sockets Layer (SSL):A standard security protocol used to establish an encrypted link between a web server and a browser. SSL ensures that all data transmitted between the server and the browser remains private and protected from unauthorized access. SSL is commonly used to secure online transactions, emails, and sensitive communications.
Selective File Control:A feature that allows users to choose the types of files (e.g., text-only or multimedia) they are willing to receive from specific contacts, enhancing security and reducing the risk of malicious attachments.
Selective Messaging:This is a unique feature of Desired Email that allows users to control and restrict who can send them messages and what types of files they can receive. With this feature, you can accept communications from approved senders and decide whether to allow text-only messages or include attachments. This ensures greater privacy and protection from SPAM, unwanted messages, and/or malware, effectively eliminating them from your inbox. (ART is a part of this feature.)
Sender:This is the individual initiating the connection, using the 64-character ART message to request communication with the recipient.
Server:This is a computer or system that provides data, resources, or services to other computers (clients) on a network. Servers can host applications, store data, or manage network traffic.
Software:This is a collection of instructions and data that tell a computer how to perform specific tasks. Software includes operating systems, applications, and programs used to run processes on hardware. Desired Email is a software service that manages secure communication.
SPAM:These are unwanted emails that clutter your inbox with irrelevant or potentially harmful content.
SPAM Filter:A system designed to detect and block unwanted or potentially harmful emails, such as SPAM, before they reach your inbox. The SPAM filter analyzes incoming messages based on certain criteria to determine whether they should be allowed through or flagged as SPAM.
Storage:This is the method by which data is saved and managed for retrieval.
Subscriber:An individual or entity who has signed up for a Desired Email subscription account and actively uses the platform's services.
Subscription Account:An account that provides access to Desired Email's services based on a recurring monthly or annual payment.
Subscription accounts are available in three tiers:
  • Premium: As the highest-level subscriber account, the Premium Account offers 6 GB of database storage, enhanced security features, and priority support. It is perfect for parents or business executives, providing the ability to set permissions for Dependent Accounts and manage multiple users with ease. Premium users enjoy greater control over messaging and advanced management tools.
  • Dependent: Linked to a Premium Account, the Dependent Account comes with 4 GB of database storage. It has permissions set by the Premium Account holder, allowing for tailored control. This is a lower-priced but effective subscription account for minors and mid to lower-tier employees.
  • Portal: Connected to a Premium or Dependent Account, the Portal Account offers 2 GB of database storage and enables secure communication with up to one hundred clients, contractors, patients, or vendors. While Portal clients can communicate with their Premium or Dependent Account holder, they cannot connect with other Portal clients. Though it lacks Selective Messaging, this account is a very inexpensive and secure solution for professionals managing several contacts.
Each of these offers different features, storage capacities, and permissions. These accounts allow customers to select the appropriate account for each user and only pay for the features they need.
Suspended:You temporarily stop receiving messages from this user.
Terabyte (TB):This represents 1,024 GB or about one trillion bytes which is used to measure very large data storage, such as cloud or server storage for businesses.
Text:Digital data consisting of letters, numbers, and symbols used to create documents or messages.
Third Party:This is an individual or organization that is not directly involved in a transaction, process, or interaction between two primary parties.
Two-Factor Authentication (2FA):This is a security process where users provide two different authentication factors to verify their identity, adding an extra layer of protection. Common methods include a password plus a code sent to a phone or email.
Unauthorized Communication:This refers to any communication that occurs without the permission or consent of the intended recipient or within a system.
User Privacy Controls:Features that allow users to manage and customize the visibility of their information, decide who can contact them, and choose the types of messages and files they can receive, ensuring a higher level of privacy.
Videos:This refers to multimedia files that display moving images, often accompanied by sound, providing dynamic visual content in emails or attachments.
Viruses:These are programs that can replicate and spread to other devices, often causing damage.
WAN (Wide Area Network):This is a telecommunications network that extends over a large geographic area, often connecting multiple local area networks (LANs) across cities, countries, or even globally. WANs enable devices in different locations to communicate and share resources, typically using public infrastructure like the internet or leased lines. Unlike LANs, WANs cover broader areas and often rely on routers and other advanced networking technologies to maintain secure, reliable connections between distant networks.
Whitelist:This is a list of approved email addresses or domains that are allowed to send messages to your inbox. Selective Messaging can function as a form of whitelisting, ensuring you only receive messages from trusted sources.
Worms:Malicious programs that spread across networks by exploiting vulnerabilities.
Zero Data Selling:Desired Email never sells your personal data to third parties, ensuring complete privacy for all users.

HIPPA Compliance

Evaluation of Desired Email's HIPAA Compliance

Desired Email is a secure communication platform designed to protect sensitive health information and meet HIPAA standards. This evaluation breaks down how the service complies with HIPAA's 12 main requirements and safeguards Protected Health Information (PHI). PHI includes personal data like names, medical records, and details about a person's health or care, and it must be kept private and secure.

What is the CFR?

The Code of Federal Regulations (CFR) is a set of rules issued by federal agencies to implement laws passed by Congress. It consists of 50 titles, each covering a different regulatory area. Title 45 of the CFR addresses Public Welfare, including healthcare regulations like HIPAA. The CFR is updated annually and has the force of law.

1. Ensure the Confidentiality, Integrity, and Availability of All ePHI 45 CFR Par. 164.306, HIPAA Security Rule
Desired Email encrypts PHI while it's being sent (in transit) and stored (at rest), ensuring that only authorized users can access it and the data remains intact and secure.

2. Implement Access Control 45 CFR Par. 164.312(a)(1), HIPAA Security Rule
The platform uses role-based access, meaning only people with permission can see PHI. Each user has a unique login which tracks who accesses what data.

3. Implement Audit Controls 45 CFR Par. 164.312(b), HIPAA Security Rule
Desired Email keeps detailed audit logs of all communications between doctors and patients. These logs can be reviewed by administrators with subscriber consent, helping monitor data access.

4. Ensure Data Integrity (Protection from Alteration or Destruction) 45 CFR Par. 164.312(c)(1), HIPAA Security Rule
Desired Email protects PHI with encryption to ensure it cannot be tampered with during transmission or storage.

5. Authentication and Authorization Procedures 45 CFR Par. 164.312(d), HIPAA Security Rule
Users must log in with their own credentials, and only people with permission can see PHI based on their role, ensuring strict control over who can access data.

6. Obtain and Document Patient Consent for PHI Disclosure 45 CFR Par. 164.508, HIPAA Privacy Rule
Doctors must get explicit consent from patients before sending them any sensitive health information, ensuring all communications follow HIPAA rules.

7. Physical Safeguards to Secure Locations Where PHI is Stored 45 CFR Par. 164.310, HIPAA Security Rule
Desired Email is hosted by Amazon Web Services (AWS), which follows strict HIPAA security standards. This ensures that no one can physically or digitally access PHI without permission.

8. Technical Safeguards to Protect PHI During Transmission 45 CFR Par. 164.312(e)(1), HIPAA Security Rule
All data is encrypted both while being sent (using TLS encryption) and stored, keeping it safe from unauthorized access.

9. Breach Notification Procedures for Unauthorized Access to PHI 45 CFR Par.Par. 164.400-414, HIPAA Breach Notification Rule
If there's a data breach, Desired Email has a plan in place to notify both affected patients and authorities as required by HIPAA.

10. Workforce HIPAA Training and Awareness 45 CFR Par. 164.530(b), HIPAA Privacy Rule
Employees who work with PHI are trained in HIPAA regulations to ensure they handle all data securely and appropriately.

11. Establish a Business Associate Agreement (BAA) 45 CFR Par. 164.504(e), HIPAA Privacy Rule
Desired Email has a formal agreement with AWS, making sure that all data is stored and handled according to HIPAA requirements.

12. Limit PHI Disclosure to the Minimum Necessary 45 CFR Par. 164.502(a), HIPAA Privacy Rule
The platform follows the minimum necessary rule, meaning only the essential information is shared to limit the exposure of sensitive health data.

Conclusion: Desired Email is fully HIPAA compliant, securing sensitive health data through encryption, access controls, and audit logs. It ensures that PHI is protected both in transit and at rest, while also meeting all 12 HIPAA requirements to keep communications between medical professionals and patients safe and private.

Subscriptions

Did you know that over 56 million people in America already pay for email services, and the numbers are growing every day? These users understand the importance of privacy, security, and control. Free email services often use your data for advertising, putting your privacy at risk. By paying for your email service, you ensure your data stays private, secure, and free from third-party access. At Desired Email, we offer premium security and features that you will not find with free services, giving you peace of mind and a better email experience.

At Desired Email, we are committed to making your communication secure, private, and tailored to your unique needs. That is why we offer three flexible subscription accounts, giving you the perfect balance of control, security, and affordability. Whether you are a busy parent, a business leader, or a professional managing several contacts, we have the right solution for you.

Premium Account
For those who need the ultimate in control and security, the Premium Account is the perfect choice. For just $9 per month or $90 per year, you get 6 GB of database storage, enhanced security features, and priority support. It is an excellent option for parents and business executives who need more control over their inbox and the ability to manage multiple users easily. With advanced messaging tools and peace of mind knowing your data is protected, this account puts you in charge.

Dependent Account
If you need an account for your children or employees, the Dependent Account, linked to your Premium Account, costs only $6 per month or $60 per year. With 4 GB of database storage, this account is ideal for minors or most employees. As the Premium Account holder, you control the settings for Dependent users, ensuring they have access only to what they need. This allows for secure communication without unnecessary complexity. By requiring a Premium Account, we ensure all Dependent Accounts are managed by a trusted account holder, giving you full control.

Portal Account
For professionals managing multiple clients, contractors, patients, or vendors, the Portal Account is a smart, secure, and affordable option. At just $3 per month or $30 per year, it provides 2 GB of database storage and secure communication with up to 100 contacts. Controlled by a Premium or Dependent Account holder, your communications are managed by someone you trust. Need more than 100 contacts? Simply purchase additional Portal Accounts. This ensures security and accountability at all levels.

Private Labeling Option
Looking to brand your email services? We offer private labeling for a one-time fee of $2,500. This feature allows you to customize your Desired Email platform, giving you a branded, professional presence that reflects your company's identity.
Email us at privatelabel@desiredemail.com to learn more about this option.

Need More Storage?
You can easily purchase an additional 2 GB of database storage for just $3 per month or $30 per year. This gives you the flexibility to expand as your needs grow, without paying for features you do not need.

At Desired Email, you only pay for the features that matter most to you. With our flexible plans, advanced security, and customizable options, we are transforming the way you connect. Together, we are making email great again!

Sign up today and take the first step toward a better, safer way to communicate!

Welcome!

Welcome to Desired Email!

We are excited to welcome you to the Desired Email family. We offer an affordable, private, scalable, secure, and user-friendly platform that enhances how businesses, charities, and individuals connect with others. Exceeding your expectations and earning your business every day are our top priorities.

Here's what makes Desired Email special:

  • Auto-Sorting: Automatically organizes your inbox, prioritizing important emails while keeping everything else neatly categorized.
  • Closed Network: Reduces external risks, providing a more reliable communication environment.
  • Data Encryption & Encoded Fields: Your data is encrypted in transit and at rest. We also encode the "To" and "From" fields, and encryption keys are never stored on our servers, ensuring full privacy.
  • Database Storage: We use database storage instead of raw storage for faster, more efficient, and secure data access.
  • HIPAA & PCI Compliance: We meet standards to securely handle sensitive healthcare and financial information.
  • Malware Protection: Blocks executable files from running on our system to prevent malware and security threats.
  • No SPAM: SPAM and unwanted messages are blocked before they reach your inbox.
  • Private Labeling: Customize your platform with your own branding for a professional touch.
  • Scalability: Grows with you, meeting the needs of businesses, charities, and individuals.
  • Selective Messaging: Control who contacts you and what files they can send.
  • Very Affordable: Premium service at a great value.
  • Zero Data Selling: We never sell your personal data, protecting your privacy.

At Desired Email, you are part of our mission to make email great again. We value your trust and are committed to delivering world-class service at an affordable price. If you need assistance, our dedicated support team is always here for you.

With heartfelt gratitude,

The Desired Email Team

Strategic Partners

PartnerDescriptionWebsite
Amazon Web ServicesA secure cloud services platform, offering computing power, storage, and content delivery.https://aws.com
Lois WhitestudCreator of engaging doodle whiteboard animation explainer videos on fiverr.comhttps://www.fiverr.com/s/Bkmdmy
Stripe Payment ServicesA secure online payment processing platform that enables businesses to accept payments online.https://stripe.com
ZampA sales tax compliance platform that helps businesses manage and automate sales tax calculations.https://zamp.com
AboutCharitiesDonateFAQsTerms of Service
User Status:[ Not Logged In ] !!74844 Hits since: 2025-06-28T18:58:07.783ZSystem Status:22h --- 2025-07-05 @ 04:21:59 UTC
All rights reserved 2019-2025 by Desired Email LLC. All concepts, processes, images & code Copyright 2019-2025 by Desired Email LLC. Patent Pending      R:-14.53%     A:33.63%     2025May22