Insurance

Choose the plan that meets your needs and spend more time enjoying your international experience not worrying about your insurance coverage.

Find Your Plan

Travel Medical
Insurance

Temporary coverage for accidents, sicknesses, & emergency evacuations when visiting or traveling outside of your home country.

International Health Insurance

Annually renewable international private medical insurance coverage for expats and global citizens living or working internationally.

Travel
Insurance

Coverage designed to protect you from financial losses should your trip be delayed, interrupted, or cancelled.

Traveler Services

Non-insurance services for worldwide emergency evacuation, field rescue, medical transport, and 24/7/365 travel assistance.

Show Services
Enterprise
Services

Meet your duty of care obligations with confidence, knowing your travelers are safe, healthy, and connected wherever they may be in the world.

Show Services

Legal Restrictions

Security Center

To ensure secure communication with our websites all sensitive information is encrypted with Secure Sockets Layer (SSL) technology. This technology encrypts any information you enter on one of our websites before it leaves your computer and decrypts it on our web servers.

Any email we send containing sensitive or confidential information is encrypted using a variety of industry standard encryption methods.

We protect our data with numerous firewalls and specialized hardware, software, and related techniques that control access. The infrastructure is constantly monitored and tested to prevent security breaches.



Email Encryption

Secure Internet Email

At IMG, we take our responsibility to protect our insureds' privacy seriously. If our business rules identify sensitive information in an outgoing message, you will receive a Secure Message Notification with a link to view your message. First-time recipients will be asked to create a password before they are granted access.

This method is typically used by users that do not have other methods to transmit e-mails securely. This method uses a Web browser over an https (SSL) connection. This method is simple and effective for users with a low volume of e-mail communication with IMG.


PKI Encryption

If you are using a public key infrastructure (PKI) e-mail encryption solution, please send a digitally signed message to encryption@imglobal.com. It will take about three business days to complete the key validation process. Once completed, e-mails transmitted to you will automatically be encrypted with your public key.

This method is typically used by corporations that require frequent e-mail communication with IMG.


Frequently Asked Questions

Emails used to appear in my inbox and I could easily open them and respond. Why do I need to login to a web site to view them?

IMG is committed to secure transmission of your personal information. Logging into a secure web site is one way in which you can view your e-mails in a manner in which the contents of the e-mail cannot be intercepted and read by a third party. This option is intended for individuals / offices that do not intend to invest an encryption solution.

I do not like the extra time involved logging in to a web site to view e-mails. Is there a way around this?

Yes. The product that IMG uses not only allows for secure Web based e-mail but also works with Public Key Infrastructure systems. If you are using a Public Key Infrastructure e-mail encryption solution, please send a digitally signed message to encryption@imglobal.com. It will take about three business days to complete the key validation process. Once completed, e-mails transmitted to you will automatically be encrypted with your public key. This will allow for seamless delivery of e-mails that you are accustomed to.

What is a Public Key Infrastructure (PKI) Encryption system?

There are numerous ways of encrypting e-mails. The use of PKI is a very popular as well as the most secure method of accomplishing e-mail encryption. The process works as follows:

  1. You apply for a certificate from a third party such as Verisign®, Thawte, etc.
  2. This third party verifies your identity and issues you a key pair (1 public, 1 private)
  3. You distribute your public key to anyone who needs to communicate with you in a secure fashion, but never your private key.
  4. Parties sending you messages use your public key to encrypt the e-mail they are sending
  5. You use your private key to decrypt and read the message they have sent you.

IMG has a solution that automates most of the process, allowing for the seamless delivery and receipt of encrypted e-mails. This means you don't have to login to a web site to view messages and you don't have to worry about manually using your keys to encrypt e-mails.

 

We use PGP. Can the IMG system work with PGP?

PGP stands for Pretty Good Privacy and it is not our preferred method of e-mail encryption. However, IMG's system can handle some varieties of PGP. To find out if IMG's system is compatible with your PGP, please send an unencrypted e-mail to encryption@imglobal.com with the contact info of the party responsible for managing your e-mail encryption. A representative of IMG will contact this party to find out specifics and determine compatibility.

I still don't understand any of this. Is there someone I can contact?

Please send any questions or feedback to encryption@imglobal.com. There are also numerous articles on the Internet about e-mail encryption, PKI and PGP.



Email Confidentiality Statement

All information in this communication, including attachments, is strictly confidential and intended solely for delivery to and authorized use by intended recipient, and may contain privileged, confidential, proprietary, and/or trade secret information entitled to protection and/or exempt from disclosure under applicable law. If you are not the intended recipient, please do not read, distribute or take action in reliance upon this message. Any review, use, distribution, or copying of this communication, and/or any action taken or omitted to be taken in reliance upon it, is unauthorized and may be unlawful. If you have received this communication in error, please immediately notify the sender by return email and delete this communication and its attachments from your computer system.