We know insurance can be confusing - let us help you find the right plan that best suits your needs. It's quick and easy, and you'll be on your way in minutes!
Find Your PlanWhether you're a traveler looking for global emergency assistance services or an employer seeking cross-border protection for your team, we have you covered.
Learn MoreStay up to date on all things travel, learn more about IMG, find answers to common questions, and more.
Contact UsAt IMG, we take our responsibility to protect our insureds' privacy seriously. If our business rules identify sensitive information in an outgoing message, you will receive a Secure Message Notification with a link to view your message. First-time recipients will be asked to create a password before they are granted access.
This method is typically used by users that do not have other methods to transmit e-mails securely. This method uses a Web browser over an https (SSL) connection. This method is simple and effective for users with a low volume of e-mail communication with IMG.
If you are using a public key infrastructure (PKI) e-mail encryption solution, please send a digitally signed message to encryption@imglobal.com. It will take about three business days to complete the key validation process. Once completed, e-mails transmitted to you will automatically be encrypted with your public key.
This method is typically used by corporations that require frequent e-mail communication with IMG.
Emails used to appear in my inbox and I could easily open them and respond. Why do I need to login to a web site to view them?
IMG is committed to secure transmission of your personal information. Logging into a secure web site is one way in which you can view your e-mails in a manner in which the contents of the e-mail cannot be intercepted and read by a third party. This option is intended for individuals / offices that do not intend to invest an encryption solution.
I do not like the extra time involved logging in to a web site to view e-mails. Is there a way around this?
Yes. The product that IMG uses not only allows for secure Web based e-mail but also works with Public Key Infrastructure systems. If you are using a Public Key Infrastructure e-mail encryption solution, please send a digitally signed message to encryption@imglobal.com. It will take about three business days to complete the key validation process. Once completed, e-mails transmitted to you will automatically be encrypted with your public key. This will allow for seamless delivery of e-mails that you are accustomed to.
What is a Public Key Infrastructure (PKI) Encryption system?
There are numerous ways of encrypting e-mails. The use of PKI is a very popular as well as the most secure method of accomplishing e-mail encryption. The process works as follows:
We use PGP. Can the IMG system work with PGP?
PGP stands for Pretty Good Privacy and it is not our preferred method of e-mail encryption. However, IMG's system can handle some varieties of PGP. To find out if IMG's system is compatible with your PGP, please send an unencrypted e-mail to encryption@imglobal.com with the contact info of the party responsible for managing your e-mail encryption. A representative of IMG will contact this party to find out specifics and determine compatibility.
I still don't understand any of this. Is there someone I can contact?
Please send any questions or feedback to encryption@imglobal.com. There are also numerous articles on the Internet about e-mail encryption, PKI and PGP.
All information in this communication, including attachments, is strictly confidential and intended solely for delivery to and authorized use by intended recipient, and may contain privileged, confidential, proprietary, and/or trade secret information entitled to protection and/or exempt from disclosure under applicable law. If you are not the intended recipient, please do not read, distribute or take action in reliance upon this message. Any review, use, distribution, or copying of this communication, and/or any action taken or omitted to be taken in reliance upon it, is unauthorized and may be unlawful. If you have received this communication in error, please immediately notify the sender by return email and delete this communication and its attachments from your computer system.