{"id":59654,"date":"2025-06-17T00:44:21","date_gmt":"2025-06-17T07:44:21","guid":{"rendered":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?p=59654"},"modified":"2025-06-24T12:33:23","modified_gmt":"2025-06-24T19:33:23","slug":"faxing-over-voip-encryption-and-compliance","status":"publish","type":"post","link":"\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/","title":{"rendered":"Is faxing over VoIP secure? Understanding encryption and compliance"},"content":{"rendered":"<p>Fax emerged as a disruptive technology in the 1980s, providing businesses with the ability to safely transfer documents over existing telephony infrastructure. This level of security, accuracy, and speed was unmatched at the time\u2014a letter or private courier simply couldn\u2019t compete.<\/p>\n<p>Fast forward to the present day, and traditional faxing is something of a business relic. It\u2019s still common in a few particular industries but for most of us, the need for a fax machine is all but gone.<\/p>\n<p>Voice over internet protocol (VoIP) faxing is a replacement technology designed to retain the reliability and security of faxing, all while leveraging IP infrastructure. But how does it keep your business communications safe? Let\u2019s find out.<\/p>\n<h2 id=\"what\" class=\"heading h2\"><strong>What is faxing over VoIP?<\/strong><\/h2>\n<p>Faxing over your <a href=\"https:\/\/www.ringcentral.com\/office\/features\/voip\/overview.html\">VoIP phone service<\/a> is largely the same process as using a traditional fax machine. A document is copied by the machine and securely transmitted to the recipient. Internet fax will either use email messages or internet fax services to facilitate the one-to-one transfer of information, effectively mimicking the analog process that used traditional phone lines.<\/p>\n<h3 class=\"heading h3\"><strong>How does transmission over VoIP differ from traditional methods?<\/strong><\/h3>\n<p>For the most part, the process is the same. The key differences lie in the way the data is transferred\u2014digital signals in a VoIP environment instead of analog signals\u2014and in the infrastructure required to support the process.<\/p>\n<h2 id=\"faxing\" class=\"heading h2\"><strong>Is faxing still relevant in 2025?<\/strong><\/h2>\n<p>As mentioned, faxing is not the global technology it was 30 years ago. For many organizations, the heavy emphasis on security isn\u2019t relevant, and the additional steps needed over modern alternatives like email and instant messaging make it less useful.<\/p>\n<p>Faxing is still useful in industries with strict regulations and compliance requirements, such as healthcare companies and legal firms.<\/p>\n<p>When security is not recommended but demanded, faxing stands as one of the most effective methods of document transmission. Faxing over VoIP retains that level of security while bringing the technology into the digital age.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-59656\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2025\/06\/VoIP-vs-PSTN-Fax-article-image@2x.jpg\" alt=\"\" width=\"1552\" height=\"988\" \/><\/p>\n<h2 id=\"benefits\" class=\"heading h2\"><strong>Benefits of fax over VoIP<\/strong><\/h2>\n<p>Faxing over VoIP has several benefits when compared to telephony faxing. While some of the advantages will vary from industry to industry, the benefits outlined here are well worth the investment.<\/p>\n<h3 class=\"heading h3\"><strong>1. Leverages modern internet infrastructure to handle communications<\/strong><\/h3>\n<p>While a fax machine stashed away in the corner of the office was once a common sight across businesses worldwide, the same can\u2019t be said today. As demand for the process has diminished, so too has the available physical infrastructure to support it.<\/p>\n<p>VoIP faxing sidesteps the issue entirely, instead relying on the computers and mobile devices every company will have alongside the global IP network. So whether you\u2019re looking at <a href=\"https:\/\/www.oleeo.com\/blog\/how-to-streamline-recruitment\/\">how to streamline recruitment<\/a> processes when handling personal information, or a quick way to get signatures on contracts, VoIP faxing can help.<\/p>\n<h3 class=\"heading h3\"><strong>2. Faster and more capable of handling large-scale faxing workloads<\/strong><\/h3>\n<p>IP networks have continued to evolve since their launch, with modern networks capable of gigabit speeds and massive amounts of data transfer. In comparison, a PSTN network can transmit only up to 64kbps (kilobits per second). That means it\u2019s roughly 15,000 times slower at transmitting an equivalent-sized file.<\/p>\n<h3 class=\"heading h3\"><strong>3. More time and cost-effective<\/strong><\/h3>\n<p>VoIP faxing is vastly more cost-effective than telephony faxing. It doesn\u2019t rely on expensive and aging physical equipment, and you don\u2019t need to be wired up to the PSTN. Just as a <a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/softphone\/\">softphone<\/a> has replaced a physical deskphone, VoIP faxing is freeing up offices of unneeded equipment. Plus multiple people can also send faxes at once\u2014so you\u2019re not wasting your staff&#8217;s time as they wait for the machine to be free.<\/p>\n<p>Furthermore, by leveraging the extensive IP network that spans the globe, there is a wider reach for faxes than even the well-established PSTN network. Internet subscriptions are a part of every company\u2019s expenses, which means there will be little additional outlay in getting your digital fax system up and running.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-59657\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2025\/06\/The-benefits-of-fax-over-VoIP@2x.jpg\" alt=\"\" width=\"1552\" height=\"988\" \/><\/p>\n<h2 id=\"challenges\" class=\"heading h2\"><strong>Challenges of fax over VoIP<\/strong><\/h2>\n<p>As useful and simple as faxing over VoIP is, there are certainly some challenges to be aware of.<\/p>\n<h3 class=\"heading h3\"><strong>1. Analog tasks in a digital environment are complex<\/strong><\/h3>\n<p>While a VoIP to VoIP fax will be a digital-only affair, sending something between a traditional fax machine and a VoIP fax system is a completely different beast. Analog to digital conversion is no simple process and can lead to all manner of issues if mishandled.<\/p>\n<p>Of course, the process is automated by the machines and VoIP system themselves, but problems can still happen. The analog-to-digital conversion process introduces additional failure points that other systems won\u2019t have.<\/p>\n<h3 class=\"heading h3\"><strong>2. Shares infrastructure with potentially insecure devices<\/strong><\/h3>\n<p>As the vast majority of VoIP fax tasks will be handled using a personal computer that\u2019s part of a vast network of connected devices, it is important to have robust IT security at all times.<\/p>\n<p>While there are several safeguards in place to ensure a secure fax process time after time, the presence of an infected machine creates a dangerous situation that can be hard to quantify. Even with <a href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/dynamic-end-to-end-encryption\/\">end-to-end encryption<\/a> in place, a single compromised device could lead to loss of data, interception of incoming faxes, and profound complications for your business.<\/p>\n<h3 class=\"heading h3\"><strong>3. Reliability is dependent upon network conditions<\/strong><\/h3>\n<p>As VoIP faxing essentially relies on the same network as your other communications, any instability or loss of network performance will impact your ability to send and receive faxes.<\/p>\n<p>Any form of packet loss or jitter in the network can cause havoc with the faxing process, which demands absolutely rock-solid network conditions to ensure a successful transfer. Your ability to fax will depend on how robust your VoIP connection is.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-59658\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2025\/06\/The-Challenges-of-fax-over-VoIP@2x.jpg\" alt=\"\" width=\"1552\" height=\"988\" \/><\/p>\n<h2 id=\"understanding\" class=\"heading h2\"><strong>Understanding encryption and compliance for VoIP faxing<\/strong><\/h2>\n<p>Encryption has been at the heart of fax technology since its inception. There have been many methods and protocols in place to ensure consistent encryption and security, though the two most notable are the T.30 and T.38 protocols. The T.30 protocol governs the rules and regulations of any transmission of documents over the PSTN (public switched telephone network) and governs all fax procedures as a result.<\/p>\n<p>Numerous other protocols touch upon smaller and more specific aspects of data transfer, such as the T.4 and T.6 protocols used for image transfers, but they all fall within the purview of the T.30 protocol. With the switch to digital-first transfers, however, the T.30 protocol is not fit to effectively moderate the process. For this reason, the T.38 protocol has been established to achieve the same goal: safe and reliable fax transfers.<\/p>\n<h3 class=\"heading h3\"><strong>The T.38 protocol explained<\/strong><\/h3>\n<p>Created in 1998, the T.38 protocol was designed as an answer to the aging T.30 protocol and as a way to leverage IP technology. Fundamentally, it can operate in two main ways\u2014as the end-to-end point for a fax to be transferred using T.38 to T.38 protocol, or as a go-between for T.30 devices that want to use the VoIP network.<\/p>\n<p>The protocol determines the bandwidth limits and compression of the files. It also mitigates the threat of packet loss by using repeat packet sends as new packets are sent to ensure the final file can be faithfully reconstructed..<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-59659\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2025\/06\/Digital-encryption-essentials@2x.jpg\" alt=\"\" width=\"1552\" height=\"988\" \/><\/p>\n<h3 class=\"heading h3\"><strong>Digital encryption explained<\/strong><\/h3>\n<p>One of the biggest advantages of digital faxing over PSTN faxing is the security itself. Traditional analog methods use audio-based encryption to protect fax transmissions by converting the file into audio information before being converted back to the intended file at the recipient\u2019s machine. This form of security is exploitable in itself, but it is the machines used that are equally at risk of being compromised.<\/p>\n<p>While no technology can claim complete protection from nefarious deeds, the security features in place with the T.38 protocol and VoIP faxing are more robust than traditional methods. There are a few key security functions to take advantage of, some of which are shared with other IP-based communications:<\/p>\n<ul>\n<li aria-level=\"1\"><b>256-bit encryption<\/b>. An extension of 128-bit encryption that uses a 256-bit long key as a form of passcode that needs to be broken to access the document. Given the vast number of possible keys, it is incredibly hard to attack it with brute force.<\/li>\n<li aria-level=\"1\"><b>Secure sockets layer (SSL)<\/b>. This is a form of authentication that ensures parties are the intended sender and recipient within a transaction.<\/li>\n<li aria-level=\"1\"><b>Transport layer security (TLS)<\/b>. The true successor to SSL, TLS is a scrambling form of encryption that protects documents during transmission through a three-stage process &#8211; encryption, authentication, and integrity check.<\/li>\n<\/ul>\n<p>These security features work together to keep critical documents safe, making faxing over VoIP a safe and secure option.<\/p>\n<h2 id=\"next\" class=\"heading h2\"><strong>The next steps<\/strong><\/h2>\n<p>Faxing over VoIP is a forward-thinking approach to resolving your business faxing needs while moving with the trend of technology. For as long as key industries need secure data transfer pathways, faxing will stand out\u2014and VoIP faxing is the next step in the process.<\/p>\n<p>If you\u2019re on the fence about building a VoIP fax system within your business, consider what infrastructure you have and what will be needed to start faxing. If you have a fleet of PCs and a stable and secure enterprise network connection, you\u2019re almost all the way there. With the right software, and some training on <a href=\"https:\/\/www.ringcentral.com\/how-to-fax-from-computer.html\">how to fax from a computer<\/a>, it\u2019ll soon be something you can add to your stack of communication tools.<\/p>\n<p>It might not become the mainstay method of communication, but when security is the primary concern it is hard to beat VoIP faxing.<\/p>\n<h2 id=\"faqs\" class=\"heading h2\"><strong>FAQs about faxing over VoIP<\/strong><\/h2>\n<h3 class=\"heading h3\"><strong>Can I use a fax machine without a landline connection?<\/strong><\/h3>\n<p>Yes. You can still use a physical fax machine to send and receive documents using an internet connection and an analog telephone adapter over VoIP.<\/p>\n<h3 class=\"heading h3\"><strong>Is it possible to fax from my email account?<\/strong><\/h3>\n<p>Many popular email services can integrate with VoIP faxing systems to send and receive faxes within the inbox itself. The process will vary based on your VoIP service provider and email system of choice.<\/p>\n<h3 class=\"heading h3\"><strong>Is it safe to fax sensitive documents?<\/strong><\/h3>\n<p>Faxing is ideally positioned to transfer confidential files thanks to numerous security features such as 256-bit encryption, secure sockets layer, and transport layer security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fax emerged as a disruptive technology in the 1980s, providing businesses with the ability to safely transfer documents over existing telephony infrastructure. This level of security, accuracy, and speed was unmatched at the time\u2014a letter or private courier simply couldn\u2019t compete. Fast forward to the present day, and traditional faxing is something of a business &#8230;<\/p>\n","protected":false},"author":1143,"featured_media":59655,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18390],"tags":[],"class_list":["post-59654","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-communication-and-collaboration"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v19.3 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Is faxing over VoIP secure? Encryption &amp; compliance musts | RingCentral<\/title>\n<meta name=\"description\" content=\"Faxing over VoIP is a modern approach to a tried and trusted technology used by industries globally. But is it secure? Let&#039;s explore VoIP faxing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is faxing over VoIP secure? Understanding encryption and compliance\" \/>\n<meta property=\"og:description\" content=\"Faxing over VoIP is a modern approach to a tried and trusted technology used by industries globally. But is it secure? Let&#039;s explore VoIP faxing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"RingCentral Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ringcentral\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-17T07:44:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-24T19:33:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2025\/06\/image2-4-1024x740.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"740\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Eric Kenney\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:site\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eric Kenney\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/#article\",\"isPartOf\":{\"@id\":\"\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/\"},\"author\":{\"name\":\"Eric Kenney\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/da5fbf1896fb9da25cdf83a5ab2683a2\"},\"headline\":\"Is faxing over VoIP secure? Understanding encryption and compliance\",\"datePublished\":\"2025-06-17T07:44:21+00:00\",\"dateModified\":\"2025-06-24T19:33:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/\"},\"wordCount\":1693,\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/06\/image2-4.png\",\"articleSection\":[\"Communication &amp; collaboration\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/\",\"name\":\"Is faxing over VoIP secure? Encryption & compliance musts | RingCentral\",\"isPartOf\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/06\/image2-4.png\",\"datePublished\":\"2025-06-17T07:44:21+00:00\",\"dateModified\":\"2025-06-24T19:33:23+00:00\",\"description\":\"Faxing over VoIP is a modern approach to a tried and trusted technology used by industries globally. But is it secure? Let's explore VoIP faxing.\",\"breadcrumb\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/#primaryimage\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/06\/image2-4.png\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/06\/image2-4.png\",\"width\":1705,\"height\":1232},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"\/us\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is faxing over VoIP secure? Understanding encryption and compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"name\":\"RingCentral Blog\",\"description\":\"Intelligent Communications\",\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\",\"name\":\"RingCentral\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"width\":2048,\"height\":309,\"caption\":\"RingCentral\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ringcentral\",\"https:\/\/x.com\/ringcentral\",\"https:\/\/www.linkedin.com\/company\/ringcentral\/\",\"https:\/\/www.instagram.com\/ringcentral\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/da5fbf1896fb9da25cdf83a5ab2683a2\",\"name\":\"Eric Kenney\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/686c4e834887301908e2d6284a639b7abd5e3446af7912a39a44ff211b8b0d8f?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/686c4e834887301908e2d6284a639b7abd5e3446af7912a39a44ff211b8b0d8f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/686c4e834887301908e2d6284a639b7abd5e3446af7912a39a44ff211b8b0d8f?s=96&d=mm&r=g\",\"caption\":\"Eric Kenney\"},\"description\":\"Eric Kenney is Director of Product Marketing at RingCentral. He is responsible for RingCentral RingEX product marketing strategy with focus on key initiatives like RingCentral for Microsoft Teams.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/erickenney\"],\"url\":\"\/us\/en\/blog\/author\/eric-kenney\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Is faxing over VoIP secure? Encryption & compliance musts | RingCentral","description":"Faxing over VoIP is a modern approach to a tried and trusted technology used by industries globally. But is it secure? Let's explore VoIP faxing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Is faxing over VoIP secure? Understanding encryption and compliance","og_description":"Faxing over VoIP is a modern approach to a tried and trusted technology used by industries globally. But is it secure? Let's explore VoIP faxing.","og_url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/","og_site_name":"RingCentral Blog","article_publisher":"https:\/\/www.facebook.com\/ringcentral","article_published_time":"2025-06-17T07:44:21+00:00","article_modified_time":"2025-06-24T19:33:23+00:00","og_image":[{"width":1024,"height":740,"url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2025\/06\/image2-4-1024x740.png","type":"image\/png"}],"author":"Eric Kenney","twitter_card":"summary_large_image","twitter_creator":"@ringcentral","twitter_site":"@ringcentral","twitter_misc":{"Written by":"Eric Kenney","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/#article","isPartOf":{"@id":"\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/"},"author":{"name":"Eric Kenney","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/da5fbf1896fb9da25cdf83a5ab2683a2"},"headline":"Is faxing over VoIP secure? Understanding encryption and compliance","datePublished":"2025-06-17T07:44:21+00:00","dateModified":"2025-06-24T19:33:23+00:00","mainEntityOfPage":{"@id":"\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/"},"wordCount":1693,"publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2025\/06\/image2-4.png","articleSection":["Communication &amp; collaboration"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/","name":"Is faxing over VoIP secure? Encryption & compliance musts | RingCentral","isPartOf":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/#primaryimage"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2025\/06\/image2-4.png","datePublished":"2025-06-17T07:44:21+00:00","dateModified":"2025-06-24T19:33:23+00:00","description":"Faxing over VoIP is a modern approach to a tried and trusted technology used by industries globally. But is it secure? Let's explore VoIP faxing.","breadcrumb":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/#primaryimage","url":"\/us\/en\/blog\/wp-content\/uploads\/2025\/06\/image2-4.png","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2025\/06\/image2-4.png","width":1705,"height":1232},{"@type":"BreadcrumbList","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"\/us\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"Is faxing over VoIP secure? Understanding encryption and compliance"}]},{"@type":"WebSite","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","name":"RingCentral Blog","description":"Intelligent Communications","publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization","name":"RingCentral","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/","url":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","width":2048,"height":309,"caption":"RingCentral"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ringcentral","https:\/\/x.com\/ringcentral","https:\/\/www.linkedin.com\/company\/ringcentral\/","https:\/\/www.instagram.com\/ringcentral"]},{"@type":"Person","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/da5fbf1896fb9da25cdf83a5ab2683a2","name":"Eric Kenney","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/686c4e834887301908e2d6284a639b7abd5e3446af7912a39a44ff211b8b0d8f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/686c4e834887301908e2d6284a639b7abd5e3446af7912a39a44ff211b8b0d8f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/686c4e834887301908e2d6284a639b7abd5e3446af7912a39a44ff211b8b0d8f?s=96&d=mm&r=g","caption":"Eric Kenney"},"description":"Eric Kenney is Director of Product Marketing at RingCentral. He is responsible for RingCentral RingEX product marketing strategy with focus on key initiatives like RingCentral for Microsoft Teams.","sameAs":["https:\/\/www.linkedin.com\/in\/erickenney"],"url":"\/us\/en\/blog\/author\/eric-kenney\/"}]}},"rc_img_url":"\/us\/en\/blog\/wp-content\/uploads\/2025\/06\/image2-4.png","rcblog_by_author":"<a href=\"\/us\/en\/blog\/author\/eric-kenney\/amp\" data-dl-events-click=\"true\" data-dl-element=\"link\"><span class=\"image\"><img src=\"https:\/\/secure.gravatar.com\/avatar\/686c4e834887301908e2d6284a639b7abd5e3446af7912a39a44ff211b8b0d8f?s=96&d=mm&r=g\" alt=\"\" width=\"30\" height=\"30\" layout=\"fixed\"><\/img><\/span><span class=\"by-author-name\">Eric Kenney<\/span><\/a>","rc_author_full_name":"Eric Kenney","rc_author_avatar":"\/us\/en\/blog\/wp-content\/uploads\/2022\/06\/Eric-Kenney.jpeg","rc_author_link":"\/us\/en\/blog\/author\/eric-kenney\/amp","rc_post_categories":"<a href=\"\/us\/en\/blog\/category\/trending\/communication-and-collaboration\/amp\">Communication &amp; collaboration<\/a>","amp_link":"\/us\/en\/blog\/faxing-over-voip-encryption-and-compliance\/amp","excerpt_title":"Is faxing over VoIP secure? Understanding encryption and ...","_links":{"self":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/59654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/users\/1143"}],"replies":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/comments?post=59654"}],"version-history":[{"count":0,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/59654\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media\/59655"}],"wp:attachment":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media?parent=59654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/categories?post=59654"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/tags?post=59654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}