Medical Claims Electronic Data Transfer DataLink Questions and Answers

Size: px
Start display at page:

Download "Medical Claims Electronic Data Transfer DataLink Questions and Answers"

Transcription

1 Medical Claims Electronic Data Transfer DataLink Questions and Answers 1.0 General Questions 1.1 Q. What are the changes and/or improvements in the new Medical Claims Electronic Data Transfer (MC EDT) service? A. Improvements in the new MC EDT service include: Enhanced security features; Ability to process large files of any format and content; Ability to designate 3 rd parties to act on behalf of a Health Care Provider (HCP); Internet availability through an existing broadband connection. No need for specialized modems and outdated protocols; Provision of a web based user interface for practices that do not have a suitable Electronic Medical Records (EMR) system; Provision of a web services interface to allow EMR systems to provide automated interfaces. 1.2 Q. What security improvements does the new MC EDT service have? A. The new MC EDT service utilizes a robust Identity and Access Management system to manage and support user authentication. In addition, all traffic to and from MC EDT is encrypted with server side using SSL transport layer security (256 Bit AES). Any system wishing to communicate with the MC EDT service must be able to support this algorithm and key strength. 1.3 Q. What is e-access? A. e-access is the name given to the framework which supports consumption of a set of business services provided by MOH using a common technology platform. Health Card Validation (HCV) and MC EDT are among the first services being provided under this e-access framework. All e-access services will be delivered with a consistent set of technologies and interfaces. July 6, 2011 Page 1 of 9

2 1.4 Q. Is there still a mailbox in the MC EDT service? A. In the MC EDT service the idea of the mailbox is still present. A mailbox is essentially associated with each CSN/Billing Number. However, unlike the current EDT Service, a user/account may have access to any number of mailboxes (at least one for each billing number) for which they have been given access through the designate process. 1.5 Q. Can software vendors provide a downstream service based on the e-access MC EDT web service? A. Yes. Software vendors are free to provide value added services for their clients and functionality consistent with the relevant security standards by developing to the web services interface. 1.6 Q. The current EDT has a function to send a file from one user to another. Is this function still provided? A. No. The user to user functionality will not be available in the new service. 1.7 Q. Can I use the old EDT and the new MC EDT service at the same time? A. All files that are currently sent to the old EDT service will be sent to the MC EDT service as well. Once the existing EDT user migrates to the new MC EDT service, access to the old EDT service will be suspended. 1.8 Q. What kind of Internet Service Provider (ISP) should I choose? A. Any ISP is acceptable to the ministry. 2.0 Development Questions 2.1 Q. Will a user interface be provided? A. Yes. A simple web user interface will be provided for those end users that do not have an automated/integrated system. This interface will provide the basic functions to upload, download, submit and list content very similar to the functionality provided today with the current EDT service. July 6, 2011 Page 2 of 9

3 2.2 Q. Can software vendors build upon the user interface? A. No. Software vendors must use the web services interface. Screen scraping or utilizing the HTML/HTTP interface may not be used by automated systems. 2.3 Q. Are there any changes to existing file formats? A. No. Only the filename conventions have changed. Users and software vendors may use any convention they wish for naming local files (if necessary). 2.4 Q. What are the file name conventions? A. Software vendors/users may choose any file naming convention they wish consistent with their operating system standards. In some cases, file names may no longer be relevant as vendors may choose not to generate intermediate files. 2.5 Q. How do I know what files remain to be downloaded? A. All downloads will be tracked on a user by user (logged in account) basis. Functions will be provided within the user interface and web services interface to LIST documents based on search criteria such. Detailed information will be provided at a later date. 2.6 Q. What kind of search criteria will I have on listing documents? A. This information will be provided at a later date. 2.7 Q. What kind of support can I expect during development? A. Support is available for questions regarding technical specifications. Support will not be provided to assist in troubleshooting or issue resolution for systems external to the ministry. 2.8 Q. Will a REST interface also be provided in addition to the SOAP web service interface? A. No. Currently SOAP 1.2 is the OPS standard. July 6, 2011 Page 3 of 9

4 2.9 Q. How many documents can I upload/download at one time? A. The interface is synchronous and therefore documents can only be sent or retrieved one at a time. However, software vendors may initiate multiple connections in order to initiate multiple concurrent download/uploads. Further details on this will be provided at a later date as part of the detailed specifications Q. Will I be required to encrypt the payload or is SSL/TLS sufficient? A. SSL/TLS is expected to be sufficient. This is being reviewed as part of our internal Threat Risk Assessment/Privacy Impact Assessment process. The full requirements for encryption will be provided at a later date as part of the detailed specifications Q. When I upload and submit a file to OBEC or Claims Processing, where will the file be stored? A. Files are stored based on the owner of the content that is being uploaded. Only Health Care Providers (HCP) can be owners. When a designate upload/submits on behalf of an HCP the content is stored within an area owned by the HCP and for the specific billing numbers used by the HCP Q. Can the MC EDT service be utilized as a mechanism for general storage of content? A. No. Only relevant material specific to the ministry may be uploaded Q. My software already requires the HCP to obtain and/or provide a certificate. Can we use that certificate for authentication instead of an Enterprise Identity Athentication Management (EIAM) account? A. No, not at the present time. This ability may be provided in the future 2.14 Q. What kind of network access will our HCP s require? A. Any broadband internet connection or access via ehealth Ontario with DSL speeds will be sufficient. A user may choose any technology including DSL, T1, Dialup TCP/IP, Satellite and WiMAX as long as it meets the security standards required by the Government of Ontario Information Technology Standards (GO ITS). July 6, 2011 Page 4 of 9

5 2.15 Q. Will files/documents be compressed on download? A. Yes, if requested. There is an option for compression. The actual method and technology are still under investigation and will be provided at a later date. 3.0 Functionality Terminology Questions 3.1 Q. What is a document? A. A document is the term used to describe any content that is uploaded or downloaded using MC EDT. As an example, it may be a claim file, an OBEC request, a Remittance Advice or Primary Care Report. Documents may be downloaded with any file name. All documents within the MC EDT service are provided a global unique identifier. This identifier is used for all actions within the MC EDT service. The original filename and a LOCAL ID attribute and description are stored with the Document by MC EDT to assist users and software vendors with relating an internally generated file with the file/document on MC EDT. 3.2 Q. What is the difference between uploading and submitting a document? A. Uploading a document only transfers its content to the MC EDT system. In order to have that document sent to Claims Processing or OBEC (as an example) it must be submitted. A document is always uploaded and associated with the Health Care Provider and a specific billing number (even if it is uploaded by a designate). 3.3 Q. What is a Claims Submission Number (CSN)? A. The CSN is more commonly referred to as a billing number and is a six character field assigned to a Health Care Provider by the ministry for the purposes of submitting medical claims. 3.4 Q. What is a Group Number? A. The Group Number is a four character field that is assigned to a group of Health Care Providers and is used with the CSN for billing purposes. July 6, 2011 Page 5 of 9

6 3.5 Q. What is a Stakeholder Number (SN)? A. A SN is a unique ten character number assigned by the ministry to every Health Care Provider or agent who is registered on the Corporate Provider Database. This number is for internal use and should not be shared. 3.6 Q. What is a designate? A. A designate is third party to whom a Health Care Provider has delegated some level of privilege to act on their behalf. A Designate could be a member of the Health Care Provider s staff, a billing agent or another health care provider. 3.7 Q. Can a designate be a designate for multiple Health Care Providers? A. Yes. A person with one account from EIAM can be a designate for any number of Health Care Providers. 3.8 Q. Can a designate have different privileges for each designation? A. Yes. A person may have download only capability for certain document types for Health Care Provider A, and have completely different capabilities for Health Care Provider B. 3.9 Q. Can another Health Care Provider be a designate? A. Yes. Anyone with a valid account from EIAM and who is enrolled to e- Access/EDT can be a designate Q. Will there be an Application Program Interface (API) for handling of designates or the self service account management functions from EIAM? A. No. This function is being provided though a Web User Interface provided by EIAM Q. What is a Service User? A. A Service User is the term used to identify the authorized user (Health Care Provider) of a service through e-access and may also be referred to as a Primary Account Holder. July 6, 2011 Page 6 of 9

7 3.12 Q. What is an End User? A. An End User is the person actually using the service and may be the same as the Service User or may be a designate. 4.0 User Accounts and Designate Access Questions 4.1 Q. Will the current EDT accounts be used for the new EDT system? A. No. MC EDT users will be required to set up a new account using Enterprise Identity and Access Management (EIAM), a self service system provided by the Ontario Public Service (OPS). 4.2 Q. How will a user obtain an account from the OPS EIAM? A. A web self service mechanism is being provided to allow users to create their own usernames in a similar fashion to that provided by ONe key. To properly assure EIAM that users are authentic, the ministry will communicate the process to current EDT users and new Health Care Providers registering for the first time. Additional details on this process will be provided at a later date. 4.3 Q. How will designates obtain an account from EIAM? A. A workflow self service mechanism will be provided by EIAM to allow HCPs to request designate accounts. Using this process, HCP s staff will be able to create and administer their own accounts. Note that third party service providers, such as billing agents, will register with the ministry and establish their own account. HCPs will be able to designate permissions for claim submission and report retrieval to their Billing Agents, as well as change these designations. 4.4 Q. Can a designate further designate the access they have been given? A. No. A designate does not have the capability to further designate privileges. July 6, 2011 Page 7 of 9

8 4.5 Q. Can a username and password be shared with an HSP staff person? A. No. A user s name and password are for individual use only as per Government of Ontario Information Technology Standards. HSP staff such as Clerical and Accounting persons will be given their own username and password. Through the designate process, an HCP can confer privileges to other accounts to act on behalf of the HCP, including other HCP s. 4.6 Q. What features will this self service account management provide? A. The self service mechanism will allow an HCP and an HCP s associates (designates, Billing Agents) to: Create his/her account based on the shared secret provided by the ministry; Manage that account (change attributes, reset password); and Assign and manage designates. 5.0 Conformance Testing Questions 5.1 Q. Will conformance testing be required? A. Yes, this is now a mandatory requirement. Software vendors are responsible for ensuring that their solution continues to be in conformance with the ministry s published specifications. All submissions using the MC EDT service will be checked to ensure the software has successfully completed conformance testing. 5.2 Q. How do I schedule a conformance test? A. When you have completed your software changes you can contact the Service Support Contact Center (SSContactCentre.MOH@ontario.ca or ). 5.3 Q. What are the tests that need to be passed and the details of those tests? A. Mandatory conformance tests will be determined based on the published business and technical specifications. These documents will be available in the fall/winter of 2011/12. July 6, 2011 Page 8 of 9

9 5.4 Q. What kind of support can I expect for conformance testing? A. The ministry will maintain an environment for conformance testing and will provide support to software vendors during the prearranged conformance testing window. Support will include communicating details of test data available for software vendor use, account set up, confirming test outcomes and assistance with troubleshooting relevant to technical specifications during initial integration testing and formal conformance testing. 5.5 Q. Will a software vendor have the ability to run through the conformance tests prior to actually performing the formal test? A. The ministry will support software vendor integration testing as a preliminary step to confirm the software vendor system s readiness for formal conformance testing. 5.6 Q. How will my software be certified once I have performed and passed conformance testing? A. Software vendors who pass certification will be provided with a conformance key that must be inserted into the web service call as part of the request. Web service calls will be rejected without a valid conformance key. Details will be provided as part of detailed specification at a later date. 5.7 Q. If I make enhancements or changes to my software do I have to go through conformance testing again? A. Software vendors must ensure that their solution continues to be in conformance with the ministry s published specifications and must submit any changes to their application for conformance testing. The ministry is not responsible for interruptions to Health Care Providers ability to upload / download / submit files caused by changes to software vendor systems. 5.8 Q. If my system has been certified through conformance testing and I haven t made any changes to it, will I have to conformance test again for any reason? A. The ministry may require software vendors to reconfirm their system s conformance as a result of changes to the ministry s service. In this case, the requirement will be communicated well in advance. July 6, 2011 Page 9 of 9

Medical Claims Electronic Data Transfer Reference Manual. Ministry of Health and Long-Term Care

Medical Claims Electronic Data Transfer Reference Manual. Ministry of Health and Long-Term Care Medical Claims Electronic Data Transfer Reference Manual Ministry of Health and Long-Term Care Version 1.0 September 2012 Medical Claims Electronic Data Transfer Reference Manual Table of Contents Table

More information

MC EDT Designee Maintenance Procedure Summary. Ministry of Health and Long-Term Care

MC EDT Designee Maintenance Procedure Summary. Ministry of Health and Long-Term Care MC EDT Designee Maintenance Procedure Summary Ministry of Health and Long-Term Care Version 6.0 June 2013 Designee Maintenance (Refer to Medical Claims Electronic Data Transfer (MC EDT) Reference Manual

More information

Electronic Data Transfer. Guidebook

Electronic Data Transfer. Guidebook Electronic Data Transfer Guidebook All possible measures are exerted to ensure accuracy of the contents of this manual; however, the guidebook may contain typographical or printing errors. The public is

More information

Configuring Your Email Client: Outlook Express. Quick Reference

Configuring Your Email Client: Outlook Express. Quick Reference Configuring Your Email Client: Outlook Express Quick Reference Table of Contents Chapter 1. Introduction...1-1 What is an Email Client?...1-1 Who Should Read This Manual?...1-1 POP, IMAP, and SSL: Which

More information

SECTION 3: TMHP ELECTRONIC DATA INTERCHANGE (EDI) TEXAS MEDICAID PROVIDER PROCEDURES MANUAL: VOL. 1

SECTION 3: TMHP ELECTRONIC DATA INTERCHANGE (EDI) TEXAS MEDICAID PROVIDER PROCEDURES MANUAL: VOL. 1 SECTION 3: TMHP ELECTRONIC DATA INTERCHANGE (EDI) TEXAS MEDICAID PROVIDER PROCEDURES MANUAL: VOL. 1 AUGUST 2015 TEXAS MEDICAID PROVIDER PROCEDURES MANUAL: VOL. 1 AUGUST 2015 SECTION 3: TMHP ELECTRONIC

More information

Configuring Your Email Client: Eudora 5.x

Configuring Your Email Client: Eudora 5.x Configuring Your Email Client: Eudora 5.x Configuring Eudora for POP 1-1 Table of Contents Chapter 1. Introduction...1-1 What is an Email Client?...1-1 Who Should Read This Manual?...1-1 How Does Email

More information

3. Will we be able to submit both CPF Payment Advice(s) and IRAS submissions one PAT Is integrated with my payroll software?

3. Will we be able to submit both CPF Payment Advice(s) and IRAS submissions one PAT Is integrated with my payroll software? INTEGRATING PAT WITH PAYROLL SOFTWARE FAQs General: 1. What is Payroll software integration with PAT system about? Companies will be able to submit CPF monthly contributions directly to PAT system via

More information

TECHNICAL SPECIFICATIONS GUIDE CANADA SAVINGS BONDS. csb.gc.ca PAYROLL SAVINGS PROGRAM 20$ 40$ 80$ 50 $ 30$ TECHGUIDE-14

TECHNICAL SPECIFICATIONS GUIDE CANADA SAVINGS BONDS. csb.gc.ca PAYROLL SAVINGS PROGRAM 20$ 40$ 80$ 50 $ 30$ TECHGUIDE-14 7 TECHNICAL SPECIFICATIONS GUIDE CANADA SAVINGS BONDS PAYROLL SAVINGS PROGRAM csb.gc.ca 40 5 30 0 20 80 70 0 What are you saving for? 50 40 20 0 80 4 20 7 7 TECHGUIDE-4 TECHNICAL SPECIFICATIONS GUIDE For

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Configuring Your Email Client: Outlook Express

Configuring Your Email Client: Outlook Express Configuring Your Email Client: Outlook Express Information in this document created by Webmail.us and provided by Bare Feet Studios. Table of Contents Chapter 1. Introduction... 1-1 What is an Email Client?...

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical

More information

Configuring Your Email Client: Eudora 5.x. Quick Reference

Configuring Your Email Client: Eudora 5.x. Quick Reference Configuring Your Email Client: Eudora 5.x Quick Reference Table of Contents Chapter 1. Introduction...1-1 What is an Email Client?...1-1 Who Should Read This Manual?...1-1 POP, IMAP, and SSL: Which Protocol

More information

RFG Secure FTP. Web Interface

RFG Secure FTP. Web Interface RFG Secure FTP Web Interface Step 1: Getting to the Secure FTP Web Interface: Open your preferred web browser and type the following address: http://ftp.raddon.com After you hit enter, you will be taken

More information

State of Nevada Department of Health and Human Services (DHHS) Division of Health Care Financing and Policy (DHCFP)

State of Nevada Department of Health and Human Services (DHHS) Division of Health Care Financing and Policy (DHCFP) Hewlett Packard Enterprise for HIPAA Compliant Electronic Transactions Nevada Medicaid Management Information System (NV MMIS) State of Nevada Department of Health and Human Services (DHHS) Division of

More information

Online Backup Service Frequently Asked Questions. 13 September 2010 Version 1.0

Online Backup Service Frequently Asked Questions. 13 September 2010 Version 1.0 Online Backup Service Frequently Asked Questions 13 September 2010 Version 1.0 1 Content 1 Content... 2 2 FAQ... 3 2.1 How much online backup space do I need?... 3 2.2 What operating systems are supported?...

More information

E-Mail: SupportCenter@uhcl.edu Phone: 281-283-2828 Fax: 281-283-2969 Box: 230 http://www.uhcl.edu/uct

E-Mail: SupportCenter@uhcl.edu Phone: 281-283-2828 Fax: 281-283-2969 Box: 230 http://www.uhcl.edu/uct A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources

More information

Moveit DMZ User Manual

Moveit DMZ User Manual ARKANSAS BLUE CROSS BLUE SHIELD Moveit DMZ User Manual EDI Services 2/1/2013 Index Moveit DMZ Introduction...1 Initial Login and Password Change...2 Navigation...8 Getting Started Folders...11 Upload a

More information

B. KTT Web-based File Transfer

B. KTT Web-based File Transfer B. KTT Web-based File Transfer The Key Total Treasury Internet File Transfer module allows clients to upload or download data files to/from KeyBank s transmission platform using a PC and Internet browser.

More information

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery WHITE PAPER HIPPA Compliance and Secure Online Data Backup and Disaster Recovery January 2006 HIPAA Compliance and the IT Portfolio Online Backup Service Introduction October 2004 In 1996, Congress passed

More information

OPUSCAPITA TYVI SERVICE DESCRIPTION. SERVICE DESCRIPTION 1 (12) OpusCapita TYVI 02/09/2015. OpusCapita Group Oy

OPUSCAPITA TYVI SERVICE DESCRIPTION. SERVICE DESCRIPTION 1 (12) OpusCapita TYVI 02/09/2015. OpusCapita Group Oy SERVICE DESCRIPTION 1 (12) OPUSCAPITA TYVI SERVICE DESCRIPTION SERVICE DESCRIPTION 2 (12) CONTENTS 1. OPUSCAPITA TYVI SERVICE... 3 2. PROPERTIES OF THE OPUSCAPITA TYVI SERVICE FOR THE REPORTER... 4 2.1

More information

eztechdirect Backup Service Features

eztechdirect Backup Service Features eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets

More information

Section I Transmission Modes

Section I Transmission Modes Transmission Modes Transmission Options Available...2 Value Added Networks (VAN)...2 File Transfer Protocol (FTP)...2 HTTPS File Upload (WEB)...3 Storing and Receiving Data with File Transfer Protocol...3

More information

How To Backup Your Hard Drive With Pros 4 Technology Online Backup

How To Backup Your Hard Drive With Pros 4 Technology Online Backup Pros 4 Technology Online Backup Features Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and

More information

How to configure your email client

How to configure your email client How to configure your email client This guide will teach you how to set up your email client. In this guide we will cover both Outlook and Windows Live mail, which are two of the major email clients used

More information

NCID User Guide Version 1.8. Office of Information Technology Services As of July 26, 2011

NCID User Guide Version 1.8. Office of Information Technology Services As of July 26, 2011 NCID User Guide Version 1.8 Office of Information Technology Services As of July 26, 2011 Document History Version Change Reference Date Author 1.0 Initial draft release 9/16/10 Heather Ferrie Update w/

More information

Electronic Service Agent TM. Network and Transmission Security And Information Privacy

Electronic Service Agent TM. Network and Transmission Security And Information Privacy Electronic Service Agent TM and Transmission Security And Information Privacy Electronic Services January 2006 Introduction IBM Electronic Service Agent TM is a software application responsible for collecting

More information

This is a summary of the edocs system. A detailed user guide follows.

This is a summary of the edocs system. A detailed user guide follows. GlobeTax provides tax reclaim services for financial institutions and their investor clients. Certain documentation is necessary to file tax reclaims. This documentation varies by beneficial owner type.

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016 Evolved Backup Features 1 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 6 Security File Compression Encryption Transmission

More information

Virtual Private Networks (VPN) Connectivity and Management Policy

Virtual Private Networks (VPN) Connectivity and Management Policy Connectivity and Management Policy VPN Policy for Connectivity into the State of Idaho s Wide Area Network (WAN) 02 September 2005, v1.9 (Previous revision: 14 December, v1.8) Applicability: All VPN connections

More information

CareGiver Remote Support Information Technology FAQ

CareGiver Remote Support Information Technology FAQ CareGiver Remote Support Information Technology FAQ CareGiver remote support Information Technology FAQ Purpose The purpose of this document is to answer Frequently Asked Questions (FAQs) regarding CareGiver

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

Secure File Transfer Protocol User Guide

Secure File Transfer Protocol User Guide Ministry of Health Secure File Transfer Protocol User Guide Date Created: November 10, 2009 Date Updated: November 12, 2013 Next Update: Version: 1.6 Approvals Signature Date Director, DA&IM Signature

More information

Secure File Transfer Protocol User Guide. Date Created: November 10, 2009 Date Updated: April 14, 2014 Version: 1.7

Secure File Transfer Protocol User Guide. Date Created: November 10, 2009 Date Updated: April 14, 2014 Version: 1.7 Secure File Transfer Protocol User Guide Date Created: November 10, 2009 Date Updated: April 14, 2014 Version: 1.7 Secure File Transfer Protocol User Guide Table of Contents 1 Overview... 1 1.1 Purpose

More information

SVA Backup Plus Features

SVA Backup Plus Features 1221 John Q. Hammons Drive Madison, WI 53717 P.O. Box 44966, Madison, WI 53717 P: 608.826.2400 TF: 800.366.9091 F: 608.831.4243 www.sva.com Introduction Computers are the default storage medium for most

More information

This is the Department s service that creates and manages unique identities, manages usernames and passwords, and provides secure access to edupass.

This is the Department s service that creates and manages unique identities, manages usernames and passwords, and provides secure access to edupass. These FAQs are specifically tailored to edupass for Students (i.e. Students and those who manage student user names and passwords [i.e. Principals / Delegated Administrators]). General What is identity

More information

SCOoffice Mail Connector For Microsoft Outlook. Installation Guide Outlook 2002

SCOoffice Mail Connector For Microsoft Outlook. Installation Guide Outlook 2002 SCOoffice Mail Connector For Microsoft Outlook Installation Guide Outlook 2002 Rev 1.2 14 Jan 2003 SCOoffice Mail Connector for Microsoft Outlook Installation Guide - Outlook XP Introduction This document

More information

How To Use Egnyte

How To Use Egnyte INTRODUCING ON DEMAND FILE SERVER FROM BT WHOLESALE APPLICATION STORE WHAT IS ON DEMAND FILE SERVER? The three most common technology challenges facing every small business are data storage, information

More information

IT Services. VPN Connectivity Guide. 1 IT Systems

IT Services. VPN Connectivity Guide. 1 IT Systems IT Services VPN Connectivity Guide 1 IT Systems Introduction...3 Cass VPN Service...4 Prerequisites...5 Connectivity process...6 Pilot Group Feedback...13 2 IT Systems Introduction This document briefly

More information

How to complete the Secure Internet Site Declaration (SISD) form

How to complete the Secure Internet Site Declaration (SISD) form 1 How to complete the Secure Internet Site Declaration (SISD) form The following instructions are designed to assist you in completing the SISD form that forms part of your Merchant application. Once completed,

More information

Orixcloud Backup Client. Frequently Asked Questions

Orixcloud Backup Client. Frequently Asked Questions Frequently Asked Questions Version 1.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means. No rights

More information

DSL-2600U. User Manual V 1.0

DSL-2600U. User Manual V 1.0 DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS

More information

Frequently Asked Questions About WebDrv Online (Remote) Backup

Frequently Asked Questions About WebDrv Online (Remote) Backup Frequently Asked Questions About WebDrv Online (Remote) Backup GENERAL INFORMATION Why backup? What is online backup? What if we already have a tape backup system? How secure are online backups? What tasks

More information

Molina Medicaid Solutions EDI Unit sftp Companion Guide 9/5/2012

Molina Medicaid Solutions EDI Unit sftp Companion Guide 9/5/2012 Molina Medicaid Solutions EDI Unit sftp Companion Guide 9/5/2012 Contents Introduction... 2 Enrollment... 2 System Regions... 3 Files Sent to Molina... 3 Files Sent From Molina... 4 First Time Logging

More information

IBackup Drive User Guide

IBackup Drive User Guide IBackup Drive User Guide TABLE OF CONTENTS Introduction... 3 Features... 4 Install IBackup Drive... 5 Login to IBackup Drive... 5 About Main Screen... 7 Settings... 8 Toolbar Options... 11 IBackup Drive

More information

MTRS 2.0 Transaction Reporting Gateway Guide

MTRS 2.0 Transaction Reporting Gateway Guide MTRS 2.0 Transaction Reporting Gateway Guide Version 1.1 October 19, 2015 Document History Version Description of Change Date V1.0 Initial version Sept 23, 2014 V1.1 Added Certification and Enrollment

More information

Introduction. Ease-of-Use

Introduction. Ease-of-Use Remote Data Backup Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and expensive method for

More information

SETTING UP MICRSOFT OUTLOOK Sending and receiving mail through the Outlook 2013

SETTING UP MICRSOFT OUTLOOK Sending and receiving mail through the Outlook 2013 SETTING UP MICRSOFT OUTLOOK Sending and receiving mail through the Outlook 2013 OK. You ve set up your mail boxes, but would prefer to manage the emails through Outlook. No problem. In this guide we ll

More information

Nokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Nokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia for Business Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E50 Configuring connection settings Nokia E50 Configuring connection settings Legal Notice Copyright

More information

Remote Access Procedure. e-governance

Remote Access Procedure. e-governance for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type of Information Document

More information

Tips for Web Filers. Tips for Web Filers. New Company Registration Page

Tips for Web Filers. Tips for Web Filers. New Company Registration Page Please read all information and instructions prior to entering the data. The instructions provide important details about completing the form and will help make your web experience a positive one. 1. How

More information

Chapter 4 Virtual Private Networking

Chapter 4 Virtual Private Networking Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between

More information

Quick Reference Guide. Online Courier: FTP. Signing On. Using FTP Pickup. To Access Online Courier. https://onlinecourier.suntrust.

Quick Reference Guide. Online Courier: FTP. Signing On. Using FTP Pickup. To Access Online Courier. https://onlinecourier.suntrust. Quick Reference Guide Online Courier: FTP https://onlinecourier.suntrust.com With SunTrust Online Courier, you can have reports and files delivered to you using an FTP connection. There are two delivery

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

Secure Email Frequently Asked Questions

Secure Email Frequently Asked Questions Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support

More information

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8 BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8 User Guide SWDT653811-793266-0827104650-001 Contents Getting started... 3 About messaging service plans for BlackBerry

More information

Xerox D95/D110/D125 Copier/Printer

Xerox D95/D110/D125 Copier/Printer Version 1.0 February 2012 Xerox D95/D110/D125 Copier/Printer Security Function Supplementary Guide 2012 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, CentreWare and FreeFlow are trademarks

More information

Technology Primer. OPS Manager, Release 7.4. Integrating Your Directory Server with our Directory Service Solution

Technology Primer. OPS Manager, Release 7.4. Integrating Your Directory Server with our Directory Service Solution Technology Primer OPS Manager, Release 7.4 Integrating Your Directory Server with our Directory Service Solution The Mitel Integrated Directory Services (IDS) application synchronizes the telephone directory

More information

Palomar College Dial-up Remote Access

Palomar College Dial-up Remote Access Palomar College Dial-up Remote Access Instructions for Windows 95/98 and Windows 2000 Following are instructions to implement dialup access to the Palomar College network, email and Internet. The minimum

More information

Terms and Conditions

Terms and Conditions EMR Adoption Program New EMR Adopter Funding Terms and Conditions PROGRAM PURPOSE. The EMR Adoption Program is intended to increase the number of Ontario physicians who use OntarioMD-certified ( certified

More information

Security Considerations

Security Considerations Concord Fax Security Considerations For over 15 years, Concord s enterprise fax solutions have helped many banks, healthcare professionals, pharmaceutical companies, and legal professionals securely deliver

More information

CipherShare Features and Benefits

CipherShare Features and Benefits CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application

More information

Configuring, Customizing, and Troubleshooting Outlook Express

Configuring, Customizing, and Troubleshooting Outlook Express 3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane

More information

WPS Secure-EDI For Internet Claim Submissions Getting Started

WPS Secure-EDI For Internet Claim Submissions Getting Started Contents WPS Secure-EDI For Internet Claim Submissions Getting Started Access WPS Secure-EDI and Sign-On 2 Change Your Password 2 Upload/Download Wizards 4 WPS Secure-EDI Home Page 5 Upload (Send) Files

More information

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey GoldKey Product Info Detailed Product Catalogue for GoldKey Do not leave your Information Assets at risk Read On... GoldKey: Reinventing the Security Strategy The Changing Landscape of Data Security With

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

RemotelyAnywhere. Security Considerations

RemotelyAnywhere. Security Considerations RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP

More information

Email Client configuration and migration Guide Setting up Thunderbird 3.1

Email Client configuration and migration Guide Setting up Thunderbird 3.1 Email Client configuration and migration Guide Setting up Thunderbird 3.1 1. Open Mozilla Thunderbird. : 1. On the Edit menu, click Account Settings. 2. On the Account Settings page, under Account Actions,

More information

ehealth Ontario EMR Connectivity Guidelines

ehealth Ontario EMR Connectivity Guidelines ehealth Ontario EMR Connectivity Guidelines Version 1.3 Revised March 3, 2010 Introduction Ontario s new ehealth strategy includes the use of commercially-available high-speed Internet to meet Electronic

More information

Using Exchange Network and CDX Services: Key Steps for Exchanging Emissions Inventory Data

Using Exchange Network and CDX Services: Key Steps for Exchanging Emissions Inventory Data Using Exchange Network and CDX Services: Key Steps for Exchanging Emissions Inventory Data Roy Chaudet and Chris Clark U.S. Environmental Protection Agency, Office of Environmental Information (OEI), 1200

More information

White Paper. Securing and Integrating File Transfers Over the Internet

White Paper. Securing and Integrating File Transfers Over the Internet White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure

More information

Logging In You must log in to the system before you can begin exchanging files with UMB. To log in to the system, follow the steps below.

Logging In You must log in to the system before you can begin exchanging files with UMB. To log in to the system, follow the steps below. Using UMB Secure File Transfer UMB Secure File Transfer is a Java-based interface that you can use to upload and download your files through a secure SSL connection using a Javasupported web browser such

More information

Business Banking Co-Browse Live Help

Business Banking Co-Browse Live Help Business Banking Co-Browse Live Help User Guide Effective Date: September 2007 Version 1.0 Digital Insight Confidential The information contained in this publication is the property of Digital Insight.

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0 Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of

More information

WS_FTP Server. User s Guide. Software Version 3.1. Ipswitch, Inc.

WS_FTP Server. User s Guide. Software Version 3.1. Ipswitch, Inc. User s Guide Software Version 3.1 Ipswitch, Inc. Ipswitch, Inc. Phone: 781-676-5700 81 Hartwell Ave Web: http://www.ipswitch.com Lexington, MA 02421-3127 The information in this document is subject to

More information

Fixes for CrossTec ResQDesk

Fixes for CrossTec ResQDesk Fixes for CrossTec ResQDesk Fixes in CrossTec ResQDesk 5.00.0006 December 2, 2014 Resolved issue where the list of Operators on Category was not saving correctly when adding multiple Operators. Fixed issue

More information

Implementation Guide

Implementation Guide Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

Linksys Gateway SPA2100-SU Manual

Linksys Gateway SPA2100-SU Manual Linksys Gateway SPA2100-SU Manual Manuel de l'utilisateur Table of Contents Looking for Basic Setup Instructions?... 3 Most Recent Version of this Manual... 3 Advanced Setup Instructions... 4 Wiring Your

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide PROTECTION AT THE SPEED OF BUSINESS Introduction The SonicWALL Global VPN Client creates a Virtual Private Network (VPN) connection between your computer and the

More information

Installation and Configuration of VPN Software

Installation and Configuration of VPN Software Installation and Configuration of VPN Software for Remote Spat Systems These instructions help you install AT&T Global Services and VPN Client (Extranet Access) software on your Windows computer for accessing

More information

Microsoft Dynamics GP Release

Microsoft Dynamics GP Release Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.

More information

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service Hosted Cloud Storage Service: Scope of Service 1. Definitions 1.1 For the purposes of this Schedule: Access Account is an End User account with Data Storage requiring authentication via a username and

More information

Hardware. Operating Systems. Browsers* Internet Service Provider. Other software

Hardware. Operating Systems. Browsers* Internet Service Provider. Other software Below are the important system requirements your environment will need in order to ensure optimal usability of the PINACLE Deposit On-Site module. Pentium 1, 3.0 GHz processor 1024x768 screen resolution

More information

DCH File Transfer Application User Manual

DCH File Transfer Application User Manual DCH File Transfer Application User Manual Table of Contents HIPAA Compliancy Statement 3 Overview 4 General.4 Getting Started 4 Screen Basics...4 Accessing the File Transfer application...5 Single Sign

More information

Exchange 2003 Mailboxes

Exchange 2003 Mailboxes Exchange 2003 Mailboxes Microsoft will stop supporting Exchange 2003 mailboxes in 2014 as it comes to the end of it s life. To maintain our levels of support and performance of all our customers, we will

More information

ipass FAQs Q: What is ipass? Q: Who should use ipass? Q: How do I get ipassconnect? When can I start using it?

ipass FAQs Q: What is ipass? Q: Who should use ipass? Q: How do I get ipassconnect? When can I start using it? ipass FAQs Q: What is ipass? A: The ipass service provides local dialup and wireless internet access in most cities and towns within the USA and many locations throughout the world. Many of these locations

More information

E-Mail: SupportCenter@uhcl.edu Phone: 281-283-2828 Fax: 281-283-2969 Box: 230 http://www.uhcl.edu/uct

E-Mail: SupportCenter@uhcl.edu Phone: 281-283-2828 Fax: 281-283-2969 Box: 230 http://www.uhcl.edu/uct A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources

More information

Broker Portal Tutorial Broker Portal Basics

Broker Portal Tutorial Broker Portal Basics Broker Portal Tutorial Broker Portal Basics Create Agent Connect Link Forgotten Password Change Your Broker Portal Password Delegate View Application Status Create Agent Connect Link Log in to your Producer

More information

Quickstream Connectivity Options

Quickstream Connectivity Options A division of Westpac Banking Corporation ABN 33 007 457 141 Quickstream Connectivity Options Document History Date 25-Jun-2003 1-Jul-2003 3-July-2003 18-July-2003 18-Aug-2003 8-Sep-2003 19-Sep-2003 31-Oct-2003

More information

Catapult PCI Compliance

Catapult PCI Compliance Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult

More information

Gigaset IP and IP-PRO Phones Provisioning / Remote Management. last modifications by J. Stahl, Bocholt, January the 18 th 2011

Gigaset IP and IP-PRO Phones Provisioning / Remote Management. last modifications by J. Stahl, Bocholt, January the 18 th 2011 Gigaset IP and IP-PRO Phones Provisioning / Remote Management last modifications by J. Stahl, Bocholt, January the 18 th 2011 Agenda Provisioning / Remote Management for Gigaset IP phones Introduction

More information

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation 9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,

More information

For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1

For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1 For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1 Talk America Services Customer Service 1-855-546-5000, press 3 TALK

More information

YubiRADIUS Deployment Guide for corporate remote access. How to Guide

YubiRADIUS Deployment Guide for corporate remote access. How to Guide YubiRADIUS Deployment Guide for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship

More information

Secure Data Transfer

Secure Data Transfer Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol

More information

Configure WorkGroup Bridge on the WAP131 Access Point

Configure WorkGroup Bridge on the WAP131 Access Point Article ID: 5036 Configure WorkGroup Bridge on the WAP131 Access Point Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless

More information

Securing Ship-to-Shore Data Flow

Securing Ship-to-Shore Data Flow Securing Ship-to-Shore Data Flow Background on Common File Transfer Methods Today corporations, government entities, and other organizations rely on Electronic File Transfers as an important part of their

More information