Essential questions
Quick answers about sending, collecting and tNotice services.
Support
FAQ
Only the information needed to orient yourself quickly.
How does tNotice work?
The sender uploads the communication, the recipient receives an email or SMS notification and collects the content online. Depending on the service, the sender receives sending and delivery confirmations or a full Forensic Postal Certificate.
How much does a tNotice cost?
There is no fixed subscription fee and no activation fee: you only pay when you send. tNotice costs EUR 1.23 + VAT for communications that require proof of delivery and includes sending receipt, 24-hour dispatch, no page or attachment limits, date and time traceability, recipient identification and signature, return receipt and Forensic Postal Certificate. tNotice Easy costs EUR 0.33 + VAT for communications that require proof of sending rather than proof of delivery and includes sending receipt, 24-hour dispatch and no page or attachment limits.
How do I send a tNotice?
For one-off sends, access https://app.tnotice.com with free registration, click 'Write a tNotice', add a recipient, write the content or upload documents and then send using the blue paper-plane icon. For mass or integrated delivery projects, you can instead use the Web Service or FTPS models defined for the project.
How do I collect a tNotice?
Collection can be completed from desktop, smartphone or tablet. The recipient receives the notice, enters the pickup platform and completes the identification flow required by the service. A dedicated video tutorial is also available: https://youtu.be/aISOh9CVgtQ.
Can a tNotice end up in spam?
No. tNotice uses a certified mail infrastructure designed for safe and proper email delivery, so service notices are not meant to be treated as spam.
Can I use with tNotice an email address that was not provided directly by the recipient?
An email address is personal data and requires prior recipient consent. That consent may be active, for example in a contract or elected digital domicile, or passive, for example when the recipient has published the address on a website, business card or public register. Without that legal basis, the communication may fail to produce the intended legal effects.
What happens if I do not collect a tNotice?
The recipient receives an initial electronic holding notice. If the communication is not collected, a second notice is sent after 10 days and a third notice from a PEC mailbox after a further 20 days. After 30 days, the effects of completed holding period are produced, similarly to traditional registered mail but with a stronger evidentiary framework.
Is receiving a tNotice free of charge?
Yes, completely free of charge. To collect the communication, the recipient may be required to provide a phone number or an image of an identity document so the service can complete the required identification step.
How can I register for tNotice?
Registration is free at https://app.tnotice.com/Account/Register.aspx by filling in the activation form. If needed, support can be reached through the service contact channels.
Electronic holding period with PIN
It is the protected collection model used by tNotice. The recipient receives a holding notice and uses the assigned PIN, together with the second verification factor required by the process, to collect the communication in a traced and evidentiary way.
Does tNotice double-PIN collection identify the recipient?
Yes. Receiving the second PIN by SMS on the recipient device is treated as an electronic-signature step that identifies the collecting party, because the phone is presumed to be under the holder's exclusive control and the verification happens in two distinct steps, in line with the framework referenced by the service.
Is it possible to break the tNotice PIN code?
No. The PIN follows a security model comparable to a bank card PIN: it is composed of 5 digits, access is blocked after the third failed attempt and each holding notice is associated with a different PIN.
Is tNotice double-PIN collection equivalent to an electronic signature?
Yes. When the pickup flow uses a two-step verification on a device attributable to the recipient, the process is treated as an electronic-signature event with recipient identification.
Is tNotice double-PIN collection equivalent to signing the return receipt?
Yes. The electronic signature collected by tNotice can be used as evidence in court similarly to the handwritten signature on a paper return receipt, while adding more structured recipient-identification elements.
What if the phone is stolen?
A stolen phone alone is not enough: the third party would also need access to the holding notice and its PIN. In any case, the legitimate holder may challenge the event by producing a theft report with a reliable date preceding the collection event.
What happens if the indicated phone is not the recipient's?
In litigation, a digital-forensics expert may verify the authenticity of the electronic signature process and identify the actual party who completed it. If the flow used an identity document, the judicial authority may also proceed against whoever used an improper document.
How can I be sure the tNotice PIN reaches the legitimate recipient?
The PIN is delivered through a sealed self-mailer card or through certified email, depending on the process. If the PIN is unlawfully diverted, the tNotice workflow preserves elements that can help identify the responsible party, unlike traditional paper registered mail.
Security
tNotice combines technical and organizational safeguards: encrypted connections, recipient-identification steps, independent periodic audits and an information-security management system. The goal is to prevent incidents, reduce their impact and preserve the traceability and integrity of the process.
Is data transmission secure on tNotice?
Yes. tNotice uses SSL with 128-bit encryption, verified digital identity through a recognized Certification Authority and protected TLS 1.2 connections to safeguard data in transit between users and the platform.
Why is the processing of personal data secure with tNotice?
Because the service operates within the eIDAS trust-services framework and complements that perimeter with an ISO/IEC 27001 certified information-security management system. Those controls are designed to protect personal-data processing and the related operational risks.
How are tNotice security measures verified?
Security measures are verified at least annually by an independent recognized body, in line with the trust-services framework. This is complemented by the ISO/IEC 27001 certification of the information-security management system.
What are the new legal security requirements for tNotice?
Trust-service providers must adopt adequate technical and organizational measures to manage security risks, prevent and minimize the impact of incidents and inform interested parties where required. tNotice addresses this perimeter through encrypted connections, periodic verification and a certified security-management model.
Uses of tNotice
tNotice supports reminders, legal notices, late-payment communications, terminations, meeting notices, contracts, welcome letters, invoices, commercial documents and, more broadly, workflows that need proof of sending, proof of delivery or content certification.
Can a tNotice also be sent to a geographic address?
No. tNotice is an electronic certified-delivery service and operates on digital recipient channels, not on physical geographic addresses.
Can tNotice deliver a fine?
No. It is not intended for traffic fines or judicial acts. It is instead designed for private-law communications permitted by law, with the benefit of a stronger digital evidentiary process.
Legal value
The legal value of tNotice comes from the eIDAS framework applicable to electronic registered delivery services, from the ministerial authorization of the operator, from the supervision exercised by the relevant authorities and from the technical model that certifies sender, recipient, dates, times and, in CPF-based services, even the delivered content.
Why does tNotice have legal value?
Because it operates within the eIDAS perimeter for electronic registered delivery, through an authorized and supervised operator, and generates digital evidence capable of attesting the parties involved, dispatch, receipt and process chronology.
Why does tNotice have greater legal value?
Because, unlike traditional registered mail that proves delivery of the envelope, tNotice can also certify the content of the communication. It generates the document fingerprint at dispatch, verifies it at collection and issues the Forensic Postal Certificate only when the fingerprints match.
What legal value does the signature on the tNotice Forensic Postal Certificate have?
The signature on the Forensic Postal Certificate is a qualified digital signature, so it has full legal value, effectiveness toward third parties and non-repudiation characteristics typical of qualified signatures used in institutional and public-administration contexts.
What legal value does the recipient acknowledgment signature on tNotice have?
It is an electronic signature collected through the double-PIN process. Like a handwritten signature, it may be challenged, but tNotice adds stronger recipient-identification and process-traceability elements that ordinary paper return receipts do not provide.
Is it mandatory to identify the sender and recipient for tNotice?
It is not mandatory in exactly the same way for every base-service scenario, but tNotice has chosen to align its model with stricter certified-delivery requirements so as to reinforce the presumption of data integrity, certainty of the parties involved and accuracy of dispatch and receipt timestamps.
Does delivery of a tNotice also prove its content?
Yes. Unlike traditional registered mail, tNotice generates the document fingerprint at dispatch and verifies it again at collection. When the fingerprints match, the Forensic Postal Certificate attests that the content sent is the same content that was made available and collected.
Why does the tNotice Forensic Postal Certificate have legal value?
Because it consolidates communication data, process log, identification methods, file fingerprints and signed and timestamped technical evidence in a single document. It is issued with qualified signature or seal and sits within the evidentiary perimeter of certified electronic delivery.
What is the Forensic Postal Certificate (CPF)?
It is the evidentiary receipt produced by tNotice. It documents the communication number, sender, recipient, process log, identification method, event timestamps and SHA fingerprints of the files, binding content and delivery in a verifiable way.
What is the difference between tNoticeQ and tNotice CPF?
tNoticeQ is the qualified service in the Article 44 eIDAS perimeter and requires a stronger sender and recipient identification model, for example through SPID or CIE. tNotice CPF instead operates in the Article 43 eIDAS perimeter and is designed for electronic communications with certified content and delivery.
Is receiving a tNotice free?
Yes. Receiving and collecting a communication is free for recipients, who can access it from desktop, tablet or smartphone.
Which channels can I use to send a tNotice communication?
Communications can be delivered to a standard email, a PEC address or a mobile number, depending on the service selected.
Does tNotice also certify the content that was sent?
Yes. Both tNoticeQ and tNotice CPF certify the communication content through technical evidence such as SHA fingerprints and retrieval references that make the delivered content verifiable.
Does pricing change based on file size or the number of attachments?
No. For tNotice and tNotice Easy, the sending price is fixed and does not change based on weight, page count or the number of attachments.
Which integration models are available?
You can integrate tNotice in interactive mode through Web Service or in automatic mode through FTPS with record layout, OCR or mail merge.
What is tNotice FES?
It is the OTP-based electronic signature service integrated with certified delivery. It lets you deliver a document, have it signed and return it automatically to the sender.