Every few years someone declares fax dead. Every few years, fax declines to die. The reason is simple: in healthcare, legal, and finance, the compliance frameworks that govern sensitive documents have not caught up to email. Fax did, and its combination of legal recognition, audit trails, and point-to-point transmission remains the lowest-risk way to send certain documents. Modern encrypted fax services bring that old protocol into 2026 with TLS in transit and secure cloud storage — keeping everything that made fax trusted while stripping away the paper, phone lines, and leaky analog cables.

Why fax still exists

Three industries drive the majority of global fax volume: healthcare, legal, and financial services. Each has regulatory constraints that keep fax embedded in daily workflows.

Healthcare and HIPAA

The Health Insurance Portability and Accountability Act treats fax as a valid channel for Protected Health Information (PHI), provided reasonable safeguards are in place. Faxing a patient record to a specialist is explicitly permitted; emailing that same record is permitted only if the mailbox meets HIPAA-compliant encryption and access requirements — which most consumer inboxes do not. Faced with uncertainty about the recipient's email security, hospitals default to fax.

Legal and admissibility

A faxed signed document has decades of case law establishing its admissibility as evidence. Email attachments can be challenged — headers can be spoofed, DKIM doesn't prove delivery, and forwarded mail is ambiguous. A fax transmission log produced by a common carrier is hard to dispute in court.

Finance and audit trails

Banks, title companies, and tax offices need a paper trail that regulators will accept. Fax transmission receipts include timestamps, recipient numbers, page counts, and transmission durations — exactly what auditors want to see. Email doesn't produce an equivalent.

The risks of unencrypted email for sensitive documents

When teams reach for email to send sensitive documents, they expose themselves to risks that don't exist with encrypted fax:

A fax, by contrast, goes point-to-point. It lands on the recipient's designated fax endpoint (physical machine or digital inbox). There's no forwarding, no cc, no search index.

How encrypted fax actually works

Modern fax services like Fax Send don't use the old analog PSTN (Public Switched Telephone Network) for the app-to-gateway leg. Here's what happens under the hood when you send a fax from your iPhone:

  1. Document upload over TLS 1.3. The app encrypts your PDF using HTTPS before it leaves your phone.
  2. Secure storage. The file sits in encrypted cloud storage with per-tenant keys.
  3. Gateway-to-fax transmission. When the gateway dials the recipient, it uses T.38 or analog protocols depending on the destination. For digital fax endpoints, the transmission stays encrypted end-to-end. For legacy analog endpoints, the final leg is unencrypted — but crucially, it's on a dedicated telephone circuit, not the public internet, so the attack surface is tiny compared to email's many hops.
  4. Delivery confirmation. A signed transmission receipt is generated and stored in your account.
  5. Automatic purge. Well-designed services delete the source document from cloud storage after a retention window, reducing long-term exposure.

The net effect: your document is encrypted everywhere it matters, and the unencrypted "last mile" to legacy endpoints is inherently harder to intercept than open-internet email.

Send encrypted faxes from your iPhone

Fax Send encrypts every document in transit and stores nothing longer than needed.

Download on the App Store

What to look for in a secure fax app

Not every fax app is created equal. Before trusting one with sensitive documents, check these criteria:

Compliance considerations by industry

Healthcare (HIPAA)

Ensure your fax provider will sign a BAA. Verify the entire transmission path is HIPAA-aligned, including storage and backups. Keep transmission receipts for the minimum six-year retention window.

Financial services (GLBA, SOX, PCI)

Choose a provider with SOC 2 Type II attestation. Ensure encryption-in-transit and at-rest are documented. Retain transmission logs for audit.

Legal (attorney-client privilege)

Privileged communications benefit from the point-to-point nature of fax. Document the transmission path in your file to demonstrate reasonable care.

EU (GDPR)

Verify the provider's data residency. If personal data of EU subjects is involved, ensure the fax path and storage remain in an approved jurisdiction or under an approved transfer mechanism.

When to use fax vs. email vs. an e-sign platform

These tools aren't competitive; they're complementary. A law firm might draft a contract in Word, negotiate over encrypted email, collect signatures via DocuSign, and then fax the executed document to a title company that won't accept anything else. Each tool earns its place because each has a different threat model.

Fax isn't dead. It's evolved.

The fax machine is dead. The fax protocol — with its point-to-point transmission, carrier-grade audit trails, and regulatory acceptance — is thriving. Wrap it in TLS on the way in, AES-256 at rest, and a modern mobile interface, and you have one of the most secure ways to transmit a signed document in 2026.

The trick is choosing a fax service that takes all three layers seriously — not just the legacy protocol, but the modern encryption around it.