Guidance for sending and receiving an encrypted NHSmail
|
|
- Louisa Beasley
- 8 years ago
- Views:
Transcription
1 Contents Guidance for sending and receiving an encrypted NHSmail Introduction 2 Sending an encrypted to a VERIFIED address 2 Receiving an encrypted 4 Reply to and forward encrypted s 7 Registration - If you have not previously received an encrypted from the Trend Micro encryption service (Gmail, Hotmail.nhs.uk) 8 Keeping encrypted s secure 11 Blocked file extensions and attachments 11 Frequently asked questions 12 Adding your NHSmail inbox into your Outlook inbox and how to switch between accounts 13 How to switch between accounts 15 Distribution lists 17 1
2 Introduction NHSmail is national secure service for health and social care designed to enable the secure exchange of information by . Users of the service send from an address ending with The service allows NHSmail users to send secure, encrypted s to any service such as free global hosted services such as Gmail/Hotmail and company run services. This document provides guidance for recipients of encrypted s sent from an NHSmail account. It explains how to open and read an encrypted and send an encrypted reply. It also provides important guidance about information governance and ensuring sensitive information that has been received remains secure. Sending an encrypted to a VERIFIED address (i.e. you are certain of the recipient i.e. you have ed them before (Gmail,.nhs.uk, Hotmail) To send an encrypted from your NHSmail address only (gina.holmes1@nhs.net), create a new message. 1. Ensure the recipient s address is correct. 2. In the Subject field of the , enter the word [secure] before the subject of the message. The word secure must be surrounded by the square brackets [secure] for the message to be encrypted. If square brackets are not used, the content of the will be sent unencrypted in plain text, and may potentially be exposed to interception or amendment. Please see below. 2
3 3. Compose the message. 4. Add any required attachments. 5. Click on Send to send the message. The service will then encrypt the message and deliver it to the intended recipient. The sent item will be stored unencrypted in your Sent Items folder, and any replies received will be decrypted and displayed as normal in your NHSmail inbox in either Outlook if you have added the mailbox into your CCG account or through logging into NHSmail if you have not added the mailbox into Outlook: Please note: [secure] is not case sensitive and [SECURE] or [Secure] for example could also be used. 3
4 Receiving an encrypted 1. When you receive an encrypted from an NHSmail address it will contain a link to access the encrypted message. The message reads: TREND MICRO PRIVATE AND CONFIDENTIAL You have received an message Secured by Private Post. 2. Please open the file called Encrypted_Message.htm for instructions on how to read your . Example: received in Gmail or CCG Outlook inbox: 4
5 3. Click Open my in the Encrypted_Message.htm file. 4. You will then see this. The system will display the encrypted message sent to you from NHSmail 5
6 5. You will then be able to: Read the From, To, Sent and Subject information Read the message Reply to the sender Reply to all recipients Forward the Download attachments 6
7 Reply to and forward encrypted s You can reply to or forward encrypted s. Your s will be automatically encrypted. You can include attachments if required. Open an encrypted NHSmail Enter your password if the system prompts for it Click Reply or Reply All or Forward (as required) Enter the recipients in the TO: CC: and BCC: fields Edit the Subject field (as required) Add attachments (as required) Enter a message Click Send 7
8 Registration If you have not previously received an encrypted from the Trend Micro encryption service you will be redirected to the Trend Micro Private Post website. There you will be guided through the registration process to create an account with the NHSmail encryption provider. Registered recipients do not need to re-register to read subsequent encrypted messages sent from any NHSmail user. If your address is not correctly displayed, click the (Not your ?) link 1. Click Register The Register Encryption Account screen will be displayed. 8
9 2. Complete all fields and tick the agreement box. Enter and confirm your password you will need to use this password to open encrypted s sent to you Select a security question and answer Select an Identification Word (that will appear on authentication screens) Type in the code displayed in the CAPTCHA image (the obscured code at the bottom of the screen aimed at preventing spam and fake registrations) Tick the box to confirm agreement to the Licence and Terms Click Continue 9
10 The Check your to activate your account screen will be displayed. 3. A message prompts you to check your inbox for a registration confirmation message and follow instructions in the message to confirm your encryption account. Registration confirmation message 4. Click Close Page This will complete your registration. Once you have successfully registered, you will be able to open, read and download any attachments in encrypted NHSmail s. 10
11 Once you have completed registration, you are registered to receive encrypted from any NHSmail user and do not need to register again if another NHSmail user sends you an encrypted . To read and reply to another encrypted message you just need to verify your identity using the credentials you registered when you first signed up to the service. If you forget your password, the system includes a self-service password reset feature. If another organisation sends you an encrypted using the same Trend Micro encryption, your Trend Micro account credentials can be used to decrypt these messages too. Keeping encrypted s secure Before sending an encrypted , you should ensure that you have verified the recipient, particularly if it contains personal confidential data or corporate sensitive data. Exchanging personal confidential data or corporate sensitive data should be done in accordance with the Safe Haven procedure and additional guidance. There are a number of attachment types which are not permitted to be sent via NHSmail, these include.exe files. If a non-permitted attachment is detected it will automatically be removed. Blocked file extensions and attachments To prevent inappropriate material being sent via NHSmail there are a number of attachments that are blocked from the service. Please see the following document for a list of file types that are blocked: il%20blocked%20and%20allowed%20attachments%20dec% pdf For further information contact the NHSmail helpdesk on or e- mail helpdesk@nhs.net. The helpdesk is available 24 hours a day, 7 days a week. 11
12 Frequently asked questions Q: What is the maximum number of addresses that can be included on a reply to an encrypted or when the is forwarded? A: You can reply to, or forward the encrypted to a maximum of 200 recipients. Q: If I want to forward an encrypted I ve received to someone else, will the remain encrypted? A: Yes. Any recipient added will receive the message securely (encrypted). Q: Is message tracking (e.g. delivery or read receipts) available on encrypted s? No. delivery over the Internet has no guarantees that a message will reach its intended recipient as Internet can be silently lost. Q: What is the maximum attachment size I can send on encrypted replies / forwards? A: 20Mb. 12
13 Adding your NHSmail inbox into your Outlook inbox and how to switch between accounts 1. Open Microsoft Outlook 2. Click on file 3. Click on add account 13
14 4. Enter your name, your NHSmail address, your password for NHSmail and then re-enter your password for NHSmail. Click on next. 5. Set up is now complete. Click on finish. 14
15 1. Click on new How to switch between accounts 2. Select the address you wish to send the data from. For information If you are unsure whether an individual has an NHSmail account you can use the search facility. Click on to. 15
16 You can search by individual organisations i.e. NHS Mansfield and Ashfield CCG Or any other organisation in England i.e. NHS Rushcliffe CCG 16
17 Distribution lists M&A and N&S now have distribution lists in Microsoft Outlook 1. Click on new 2. Click on To 3. Type in either all mansfield or all newark 4. Double click on the organisation(s) you require. Click ok. 17
18 You will then be able to select which address you can send the information from. 18
Guidance for recipients of an encrypted NHSmail email
Guidance for recipients of an encrypted NHSmail email January 2015 V.03 Copyright 2013, Health and Social Care Information Centre. 1 Contents Introduction 3 Receiving an encrypted email 3 Reply to and
More informationE-mail Encryption Recipient Guidelines
E-mail Encryption Recipient Guidelines Canadian Western Bank Group Human Resources Department November 1, 2013 This reference guide was developed for training and reference use only. Any discrepancies
More informationGCSx Email Guide for Internal Users. How to send sensitive business and personal information securely
GCSx Email Guide for Internal Users How to send sensitive business and personal information securely Document control Description Version V.2 Created May 2013 GCSx Email Guide for Internal Users Status
More informationFDIC Secure Email Procedures for External Users April 23, 2010
FDIC Secure Email Procedures for External Users April 23, 2010 This document contains information proprietary to the Federal Deposit Insurance Corporation. Table of Contents 1. Introduction...2 2. Receiving
More informationEmail Encryption. Cisco Ironport. using. Click here to begin
Email Encryption using Cisco Ironport Click here to begin Contents Sending an encrypted email Receiving an encrypted email - Registering with Cisco - Opening the email (after registration) Replying to
More informationE Mail Encryption End User Guide
E Mail Encryption End User Guide TABLE OF CONTENTS Why Use Email Encryption... 2 What is a Registered Envelope... 2 Features & Benefits... 2 Security Policies... 2 How to Compose and Send an Encrypted
More informationSecure Mail Registration and Viewing Procedures
Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email
More informationThis document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee.
Email Encryption User Guide Sterne Agee is committed to the security of your information. We have implemented Cisco Email Encryption to secure email communication so that only you can open it.* Questions?
More informationHoneywell Secure Email External User Guide August 2013
Honeywell Secure Email External User Guide August 2013 PAGE: 1 of 14 Chapter No Table of Content Page No 1 Introduction 3 2 Using the Honeywell Secure Email Interface 3 3 Sending an Encrypted Email to
More information1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6
MailTrack How To Document 27 March 2014 Table of Contents 1. How to Register... 2 2. Forgot Password... 4 3. Login to MailTrack Webmail... 5 4. Accessing MailTrack message Centre... 6 5. Creating a MailTrack
More informationjohnireland@eircom.net
Email Electronic mail is the transmission of mainly text based messages across networks. This can be within a particular network - internal mail - or between networks - external mail. The most common network
More informationSecure Email Recipient Guide
Secure Email Recipient Guide Contents How to open your first Encrypted Message.... 3 Step-by-Step Guide to Opening Your First Envelope... 3 Step One:... 3 Step Two:... 4 Step Three:... 4 Step Four:...
More informationOutlook 2013 Delegate Access Managing Someone Else's Calendar and Inbox
USC Marshall School of Business Marshall Information Services Outlook 2013 Delegate Access Managing Someone Else's Calendar and Inbox Delegate access is typically used when an assistant will be managing
More informationSecure E-mail. Using Cisco Secure E-mail Server
Secure E-mail Using Cisco Secure E-mail Server Background The UnitedHealthcare secure e-mail system is offered through Cisco Secure Server and is used to securely exchange information with providers. This
More informationVanguard Secure E-Mail Service (VSES) User Guide
Vanguard Secure E-Mail Service (VSES) User Guide Information Security Department January 8, 2013 Contents Guide for Users of Secure E-Mail From Vanguard 1 View Secure E-Mail 1 New Registration 3 Compose
More informationEJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8
EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8 External Users Decrypting Secure Messages The following sections describe how users external to EJGH receive and decrypt secure messages. Reading
More informationSecure Email Client User Guide Receiving Secure Email from Mercantile Bank
Receiving Secure Email from Contents This document provides a brief, end-user overview of the Secure Email system which has been implemented by. Why Secure Email? When someone sends you an email, the email
More informationUsing the PeaceHealth Secure E-mail System
1 PeaceHealth is using a Secure E-mail System that allows for secure E-mail communications between individuals with a PeaceHealth E-mail address and individuals with E-mail addresses outside the PeaceHealth
More informationSecure Email User Guide Receiving Secure Email from Merchants Bank
Secure Email User Guide Receiving Secure Email from Merchants Bank Contents This document provides a brief, end-user overview of the Cisco Registered Envelope Service Email system which has been implemented
More informationMicrosoft Exchange Hosted Archive (MEHA)
Microsoft Exchange Hosted Archive (MEHA) All the Features of NYSeMAIL Archiving including Using for Business Continuity Using MEHA Using MEHA The Microsoft Exchange Hosted Archive (MEHA) can be accessed
More informationReceiving Secure Email from Citi For External Customers and Business Partners
Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure
More informationInstructions for Secure Email Cisco Registered Envelope Service (CRES)
Instructions for Secure Email Cisco Registered Envelope Service (CRES) Please read the official Cisco Guidance on the Cisco Registered Envelope Service And Frequently Asked Questions A courtesy attempt
More informationPrepared by Mythtech Limited OFFICE 365 EMAIL MIGRATION MANUAL GUIDELINE
Prepared by Mythtech Limited OFFICE 365 EMAIL MIGRATION MANUAL GUIDELINE Table of Contents Change Password... 1 Send New Email... 2 Forward E-mail... 3 Reply E-mail... 4 Archive old emails... 5 Office
More informationE-mail Encryption. How do I send my e-mail encryption key?
E-mail Encryption SecurenCrypt e-mail encryption was designed to work as a plug-in with Microsoft Outlook. The following instructions are geared toward users encrypting e-mail with Outlook. However, throughout
More informationReceiving Secure Email Customer Support frequently asked questions
Registering a Secure Password Q. Where do I find the current Secure email guidance documentation? A. Published on Glasgow City Council website. Q. My organisation has its own email encryption tool, do
More informationBlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8
BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8 User Guide SWDT653811-793266-0827104650-001 Contents Getting started... 3 About messaging service plans for BlackBerry
More informationSecuremail User Guide
Securemail User Guide Created: 2009-02-17 Updated: 2013-07-05 - New links and Address Book instructions Updated: 2014-04-23 - http://dhhs.ne.gov/documents/dhhs-securemail-userguide.pdf 1 INDEX: How Securemail
More informationEgress Switch for Third Parties
Egress Switch for Third Parties The London Borough of Tower Hamlets is introducing a new more secure way of communicating with third parties. Third parties are: Individuals receiving a service from the
More informationADP Secure Email Client User Guide
ADP Secure Email Client User Guide A Guide to Exchanging Secure Emails Using the Voltage SecureMail System Version 1.0 July 2008 2008 ADP, Inc. Copyright Information ADP provides this publication as is
More informationSecure Messaging Service
Human Resources Secure Messaging Service Receiving Secure Emails from West Berkshire Council Table of Contents What are Secure Messaging notifications?... 3 How do I set up my Secure Messaging account?...
More informationEnd-User Reference Guide
Guide Websense Advanced Email Encryption v7.6 Websense Advanced Email Encryption Copyright 1996-2011 Websense, Inc. All rights reserved. This document contains proprietary and confidential information
More informationEnd-User Reference Guide
Guide Websense Advanced Email Encryption v7.6 Contents Receiving secure email....................................... 1 How do I open a secure message?............................ 1 How do I register for
More informationSecure Messaging (Direct) Training Manual
Secure Messaging (Direct) Training Manual 9D Revised 4.1.14 HealtheConnections Secure Messaging (Direct Mail) HealtheConnections Secure Messaging is a solution based on the Nationwide Health Information
More informationEgress Switch (Secure Email) for Third Parties
Egress Switch (Secure Email) for Third Parties The London Borough of Redbridge is implementing a new more secure way of communicating with third parties. Third parties are: Individuals receiving a service
More informationHow To Set Up Your Email
How To Set Up Your Email Contents Page Microsoft Outlook 1 Outlook Express 6 7 Webmail (this is for those who do not use an email programme) 12 Windows Live Mail 22 Mozilla Thunderbird 26 Windows Mail
More informationReceiving the First Encrypted Email and Registration:
Alpine Bank values our customers and the need to keep their personal and account information safe. For that reason, we have teamed with Websense and Voltage Security to provide advanced email protection
More informationYahoo E-Mail Terminology
ka 412.835.2207 www.bethelparklibrary.org Yahoo E-Mail Terminology Yahoo Yahoo is the name of the website that your account will be set up in. To get to your e-mail, you will always need to start at the
More informationSteps to Opening Your First Password-Protected Envelope
This section provides step-by-step instructions for opening a password-protected Registered Envelope for the first time. The steps demonstrate a typical scenario for a first-time recipient. Some of the
More informationHow to Send an Encrypted Email via KDADS' Outlook Client or Outlook Web Application
How to Send an Encrypted Email via KDADS' Outlook Client or Outlook Web Application In order to ensure Personal Health Information (PHI) and Personally Identifiable Information (PII) is protected, KDADS
More informationSECURE Email User Guide
SECURE Email User Guide Receiving SECURE Email from Starion Financial Starion Financial is now offering an enhanced email encryption tool, IronPort PXE, which enables the email communication of sensitive
More informationNHS Mail User Guide Guidance on the use of NHSmail for new users AJ O'connell (Sussex HIS) 05/11/2012 V1_4
NHS Mail User Guide Guidance on the use of NHSmail for new users AJ O'connell (Sussex HIS) 05/11/2012 V1_4 NHS Mail User Guide Information Link: www.nhs.net NHS mail is an Encrypted Email system used by
More informationVaaler Insurance, Inc. RPost Email. Guidelines and Instructions. Sherry D Samson. rev 10/1/15 by BH
Vaaler Insurance, Inc. RPost Email Guidelines and Instructions Sherry D Samson 2015 rev 10/1/15 by BH Contents RPost Guidelines... 3 Registered Email no encryption or signature required... 5 Registered
More informationHow to use Office 365 with your OneDrive File Storage Facility
How to use Office 365 with your OneDrive File Storage Facility As a student at Pembrokeshire College you will have access to Microsoft s Office 365 and the OneDrive file storage facility. Microsoft Office
More informationUnipass Securemail Client. User Guide v1.2
Unipass Securemail Client User Guide v1.2 This document provides a step by step illustrated user guide for the Unipass Securemail desktop software client / plug-in. UIdP Project Team 28/06/2015 Contents
More informationRegistering at the Securemail site
Registering at the Securemail site Before using the Secure Mail service for the first time, you must perform a one-time service registration by completing the following steps. 1. When a Secure Mail is
More informationRecipients Guide for Email Encryption Version 1.2
Recipients Guide for Email Encryption Version 1.2 Document Location n/a Copies can be requested from the IT Dept 01603 50 8622 Revision Previous Revision by Summary of Changes Version date revision date
More informationMSGCU SECURE MESSAGE CENTER
MSGCU SECURE MESSAGE CENTER Welcome to the MSGCU Secure Message Center. Email is convenient, but is it secure? Before reaching the intended recipient, email travels across a variety of public servers and
More informationBlackBerry Internet Service. Version: 4.5.1. User Guide
BlackBerry Internet Service Version: 4.5.1 User Guide Published: 2014-05-22 SWD-20140522173857703 Contents 1 Getting started...7 About the messaging service plans for the BlackBerry Internet Service...7
More informationAfter you've enabled POP/IMAP access in i.mail, you need to configure your email client to download i.mail messages.
User Guide- i.mail enhancement Configure POP/IMAP access using Outlook and Windows Mail Firstly, you need to enable POP/IMAP on your i.mail account: 1. Log into your i.mail account via web 2. Click Mail
More informationUsing etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
More informationSecure Email User Guide. Guidance for Recipients of Secure Email Messages from Lloyds Banking Group
Guidance for Recipients of Secure Email Messages from Lloyds Banking Group Version: 1.3 Last updated: 14/04/2016 1 Introduction This user guide is intended for third party email users users who receive,
More informationOutlook Web Access An Introductory Guide
Outlook Web Access An Introductory Guide IT Training & Assessment Unit, Queen s University Belfast 1 Contents Logging on... 3 Email... 3 Compose a Message... 4 Saving an Email Attachment... 5 Saving a
More informationReceiving Secure Emails
Receiving Secure Emails This document explains how you can access emails that have been sent to you through CyberArk s Secure Email system in several simple steps. When you receive a secure email, you
More informationPage 1 Rev Date: February 2010. User Manual for Encrypted Email Services
Page 1 User Manual for Encrypted Email Services Instructions for Using Encrypted Email Services This document is being provided to assist you in opening encrypted emails sent from Century Bank. The following
More informationNHSmail and mobile devices overview
NHSmail and mobile devices overview Version: V.7 Date: May 2011 THIS INFORMATION IS FOR NHS STAFF AND IS NOT TO BE DISTRIBUTED OR COPIED OUTSIDE OF THE NHS Version 7 Crown Copyright, May 2011 Contents
More informationHow To Encrypt An Email From A Cell Phone To A Pc Or Ipad (For A Partner) With A Cisco Email Encryption Solution (For Partners)
New PHI & PII E-mail Encryption Solution (Partner Notification) In a continuing effort to utilize the advantages of email security while at the same time protecting clients private information, the Department
More informationP309 - Proofpoint Encryption - Decrypting Secure Messages Business systems
Procedure P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems P309 - Page: Page 1 of 12 Date of Release: 23 February 2011 Status: Final Document Reference: Title: P309 Release Number:
More informationGuidance for using the East Sussex County Council Secure Email system
Guidance for using the East Sussex County Council Secure Email system ESCC February 2010 Using the ESCC SecureMail system The ESCC SecureMail system is an email system that provides a high level of security
More informationHow to access your email via Outlook Web Access
How to access your email via Outlook Web Access 1) Open your internet browser and type in the following address: www.law.miami.edu * Aol users must minimize their browser and use Internet Explorer 6.0+
More informationSecure Email Frequently Asked Questions
Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support
More informationNationstar Mortgage Secure Email Client User Guide
Nationstar Mortgage Secure Email Client User Guide A Guide to Exchanging Secure Emails Using the Nationstar Mortgage Secure Email Message Center Version 1.0 July 2010 1 Nationstar Public Copyright Information
More informationEnd-User Reference Guide
Guide Websense Advanced Email Encryption v7.x Websense Advanced Email Encryption Copyright 1996-2014 Websense, Inc. All rights reserved. This document contains proprietary and confidential information
More informationSecure Email FAQs for External Stakeholders
Secure Email FAQs for External Stakeholders Ver: 07 November 2012 What is secure email and why am I getting encrypted emails from the IPCC? Why do I have to register to open a Registered Envelope? What
More informationHow To Use The Gtokus Secure Mail System
Department of Banking and Finance (DBF) Secure Message Center DBF Secure E-Mail Procedures This document contains information proprietary to the Georgia Department of Banking and Finance and shall not
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationSecure Email User Guide
Secure Email User Guide Contents Secure email at HSBC. 2 About SecureMail... 2 Receiving a secure email sent via SecureMail 3 Opening a secure email sent via SecureMail... 4 Resetting your SecureMail password..
More informationIntroduction to Email. Jan 24 th 2010
Introduction to Email Jan 24 th 2010 Email Need special software (called email-reader or emailclient) to connect to the email-server and download the emails Email-server has limited space for each user
More informationTable of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started
Webmail User Manual Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Chapter 2 MAILENABLE KEY FEATURES OVERVIEW...
More informationisecuremail User Guide for iphone
isecuremail User Guide for iphone Page 1 CONTENTS Chapter 1: Welcome... 4 Chapter 2: Getting Started... 5 Compatability... 5 Preliminary Steps... 5 Setting up a POP3 / IMAP4/ Exchange Email Account...
More informationHow To Use An Ipo Switch For Third Parties
Egress Switch for Third Parties The London Borough of Lambeth is introducing a new more secure way of communicating with third parties. Third parties are: Individuals receiving a service from the council,
More informationCan I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.
How does Secure E-mail work? When an e-mail is initiated or responded to the secure e-mail algorithm will determine if the e-mail needs to be encrypted based on predefined criteria. If it meets the predefined
More informationMessageGuard 3.0 User Guide
MessageGuard 3.0 User Guide Table of Contents Introduction... 3 Installing the MessageGuard Desktop Client... 3 Sending Secure E-mail Messages with the Desktop Client... 11 Reading Secure E-mail Messages
More informationStewart Secure Email User Guide. March 13, 2015
Stewart Secure Email User Guide March 13, 2015 Table of Contents Introduction... 1 What is secure email?... 1 Why secure email?... 1 What is personal, non-public information?... 1 How is my data protected?...
More informationOutlook Operating Instructions. Internal Desktop Access
Outlook Operating Instructions Internal Desktop Access OUTLOOK OPERATING INSTRUCTIONS (INTERNAL DESKTOP ACCESS) FREQUENTLY ASKED QUESTIONS & ANSWERS Q: How do I check my email while on campus? A: Click
More informationOverview of Registered Envelopes. Registered Envelope Notification Message
Overview of Registered Envelopes A Registered Envelope is a type of encrypted email message. Some Registered Envelopes are password-protected, while others are encrypted but do not require a password.
More informationClass Outline. Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account
EMAIL Basics Class Outline Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account Part 3 Managing Your Messages Deleting messages The Trash
More informationReading mail via the Web on Mail.uh.edu
Reading mail via the Web on Mail.uh.edu Connecting to mail via the Web Once you have obtained your userid and password, go to the Web Site http://mail.uh.edu You will see the following screen: Click Log
More informationExchange 2003 Mailboxes
Exchange 2003 Mailboxes Microsoft will stop supporting Exchange 2003 mailboxes in 2014 as it comes to the end of it s life. To maintain our levels of support and performance of all our customers, we will
More informationEmail Encryption User Guide
Email Encryption User Guide August, 2013 Adapted from: Cisco Registered Envelope Recipient Guide Cisco Systems, Inc. TABLE of CONTENTS Section 1: Overview of Email Encryption... 3 Page Section 2: Overview
More informationEMAILING USING HOTMAIL
EMAILING USING HOTMAIL Signing into Your Email Account Open up explorer and type in www.hotmail.com in the address bar. Enter your email address. Hit the tab key on the keyboard and enter your password.
More informationNote: Before E-Z Mail can be installed; Microsoft Outlook or Lotus Notes must be installed on your system.
Note: Before E-Z Mail can be installed; Microsoft Outlook or Lotus Notes must be installed on your system. Install E-Z Mail by using the E-Z Mail installation on the original CDS installation disk, or
More informationMUTUAL OF OMAHA SECURE EMAIL SYSTEM CLIENT/PARTNER USER GUIDE
MUTUAL OF OMAHA SECURE EMAIL SYSTEM CLIENT/PARTNER USER GUIDE Mutual of Omaha Secure Email Client/Partner User Guide April 2015 TABLE OF CONTENTS INTRODUCTION 3 About this Guide 3 CREATING A MUTUAL OF
More informationTexas Medicaid & Healthcare Partnership (TMHP)
Texas Medicaid & Healthcare Partnership (TMHP) E-Mail Encryption Basics/Help Guide Texas Medicaid & Healthcare Partnership Page 1 of 16 Print Date: 2/24/2009 Table of Contents LTC Online Portal User 1.0
More informationE-mailing a large amount of recipients
E-mailing a large amount of recipients DO NOT use the TO or CC field! If you have a large list of recipients you need to send an email you, you should never try sending one large email with all of the
More informationEmail. Using Outlook Live
Using Outlook Live Contents What is Email?... 4 Using Email... 4 Email Address... 4 Password... 4 The Windows Live Hotmail Welcome Screen... 6 Inbox... 7 The Mail Inbox Toolbar... 8 Sending Mail... 9 Attaching
More informationUser Guide. Version 3.0 April 2006
User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark
More informationVersion 4 Revised 5/2015
Email Encryption Manual Version 4 Revised 5/2015 This document provides information on sending, receiving, and saving encrypted emails using the WRC Group Message Center. Contents What is Email Encryption...
More informationSecure Email User Guide
Secure Email User Guide Transport Layer Security (TLS) Pretty Good Privacy (PGP) PDF Messenger 1 Contents 1 Introduction... 3 2 Transport Layer Security (TLS).4 3 Pretty Good Privacy (PGP).5 4 PDF Messenger...
More informationCISCO SECURE MAIL. External User Guide. 1/15/15 Samson V.
1/15/15 Samson V. 1. These instructions are for users who reside outside the University of Colorado Denver that receive encrypted emails from faculty or staff of UC Denver. As a part of our HIPAA compliance
More informationExternal End User Training Guide: Secure Email Extract
External End User Training Guide: Secure Email Extract Version 6 August 12, 2013 Prepared by 7/29/2013: Kris Chromey, Training Coordinator Michelle Tuscher, Vault Implementation Coordinator Edited for
More informationFacilities and Safety How-To Guide: Accessing and Using Your UCF Webmail Account
Launch Internet Explorer Click on the Internet Explorer icon at the bottom left of the computer screen. Go to the UCF Webmail Website 1. In the address bar at the top of the screen, type webmail.ucf.edu.
More informationSecure Email - Customer User Guide How to receive an encrypted email
How to receive an encrypted email This guide has been developed for customers/suppliers of Glasgow City Council who are due to receive sensitive information from us. It will explain how to use our secure
More informationSECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011
SECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011 Introduction In October, 2008, the Division of Welfare and Supportive Services (DWSS) announced the introduction of secure e-mail through ASM 17-08.
More informationEmail at Bradford - Outlook
This document provides guidance for staff using Office 365 with Microsoft Outlook 2010 for email at the University of Bradford. The University of Bradford retains copyright for this material, which may
More informationPrerequisite. Getting Started. Email Signing and Encryption using Microsoft outlook 2007
Email Signing and Encryption using Microsoft outlook 2007 Prerequisite a. The user s email account has been added and correctly configured into Microsoft outlook. b. The user has an authentication certificate.
More information4. Click Next and then fill in your Name and E-mail address. Click Next again.
NOTE: Before installing PGP, Word needs to be disabled as your editor in Outlook. In Outlook, go to Tools: Options: Mail Format and uncheck Use Microsoft Office Word to edit e-mail messages. Failure to
More informationSecure transmission of Protected Health Information (PHI)
PHI Email Encryption Instructions for External Entities Page 1 of 5 Secure transmission of Protected Health Information (PHI) To ensure that all communications (email, phone, or fax) containing Protected
More informationNHS Mail Basic Training Guide
Royal Derby Hospital 2011 Education, Training and Development I.T. Training Department NHS Mail Basic Training Guide Version 3.1 ND 05/11 No amendments should be made to the document without the Authors
More informationSecure Message Center User Guide
Secure Message Center User Guide Using the Department of Banking Secure Email Message Center 2 Receiving and Replying to Messages 3 Initiating New Messages 7 Using the Address Book 9 Managing Your Account
More information