* NOTE - When accessing the digital version of this file, click on the page number to skip to that section of the document.
|
|
- Philomena Fox
- 8 years ago
- Views:
Transcription
1 Health and Social Care Encryption Guide for Contractors Section Page 1. Introduction 1 2. Pre-requisites 2 3. Caveats 2 4. Recipient registering with the HSC Secure Service 3 5. Recipient setting their password 4 6. Registration confirmation 4 7. Recipient receiving the encrypted Recipient receiving the encrypted filed 6 9. Recipient accesses the decrypted Recipient replies with an encrypted Recipient composing reply Recipient adding attachments Recipient sending the encrypted reply Recipient receives sent confirmation Sender receives reply from recipient Recipient resetting the password Recipient recovering the password Expiration dates for s and accounts Who to contact for queries or problems Subsequent actions 13 * NOTE - When accessing the digital version of this file, click on the page number to skip to that section of the document. 1. Introduction This document provides guidance on how contractors can send encrypted replies to HSC staff. In this guide, contractors are referred to as Recipients as they must receive an from a member of HSC staff before they can send encrypted information in reply. Encryption must be applied to any content that is deemed sensitive orcontains patient information.examples of sensitive and personal information include but are not limited to: copies or extracts of data from clinical systems; commercially sensitive information; contracts under consideration; budgets; staff reports; appointments actual or potential not yet announced; disciplinary or criminal investigations.
2 Personal information is further defined by the Data Protection Act (1998). 2. Pre-requisites a) The Recipient s organisation must allow encrypted attachmentsthrough their quarantine procedures. b) The Recipient requires Adobe Reader V9 or later to open the PDF filesthat are encrypted. Other PDF readers may work but are not supported. c) Procedures should be agreed between the Sender and Recipient onhow the service should be used i.e.: Test the process is working as expected before sending the firstsensitive/personal data. All sensitive/personal data to be in an attachment rather than thebody of the . Acknowledgement of receipt. 3. Caveats a) An encrypted exchange must be initiated from within the HSC. b) It will not encrypt between HSC organisations including GPs(hscni.net and n-i.nhs.uk addresses). c) The following domains are not routed through this service andtherefore not encrypted by it: Mail domain n-i.nhs.uk cjsm.net @sportscouncil-ni.org.uk Description HSC legacy mail domains and GPs Mainland NHS organisations NHS mail Criminal Justice Secure Mail Northern Ireland Government Departments Northern Ireland Government Departments Council for the Curriculum, Examinations and Assessment Historical Institutional Abuse Inquiry Sports Council NI d) The password applied to an encrypted will always remain the onethe Recipient had set at the time the was sent. Therefore if arecipient resets their HSC Encrypted Service password theymust use their old password to open old encrypted s. If therecipient forgets their password they will not be able to access oldencrypted s.
3 e) Certain file types cannot be opened by Adobe Reader when attachedto encrypted SPX messages. These file types include but are notlimited to:.exe executable files.zip compressed files.bat batch files.dll dynamic libraries.class java class f) The size of attachments is restricted to 10Mb for all HSC organisations. 4. Recipient registering with the HSC Secure Service a) You will first be required to mail and head your subject line request for registration for encrypt service. A member of staff will then send you an to begin the encryption registration process. b) The first time the Recipient is sent an encrypted from an HSC address using this service, the Recipient must register their address with the HSC Encryption Server. To do this, the Recipient will receive an with contents similar to the figure below. c) To register with the service, click on the here link, circled in red.if the program does not support active links, then copy and paste thelink circled in greeninto your internet browser. NOTE 1: A Registration Reminder will be issued after 5 days ifregistration has not taken place.
4 NOTE 2: After 10 days the Recipient will not be able to register to receive the , the will be deleted and the Sender notified. NOTE 3: The Sender is notified when the Recipient has successfully registered. 5. Recipient setting their password a) This will open the default internet browser, i.e. Internet Explorer, on therecipient s PC and the figure below is displayed. b) The Recipient then completes the Password and Confirm Password fields.the complexity of the password required is displayed in the PasswordRequirements box.note: The changes to a when the password meets the passwordrequirement. All three need to change to before the Recipient can proceed. c) The Recipient must then select 3 questions from the drop down list in thepassword Reset/Recovery section and enter 3 answers. This will allow therecipient to reset or recover their password if required at a later date withouthaving to contact the BSO Service Desk. d) When all fields are completed the Recipient can then click on the Registerbutton to complete the process. 6. Registration confirmation When the registration has been successfully completed, the Recipient will receive a notification as in the figure below.this internet browser window can be closed.
5 7. Recipient receiving the encrypted a) The Recipient will now receive another which contains the original content from the Sender - see the figure below. b) To access that content, the Recipient should click on the PDF logo at the bottom of the message, circled in red.
6 8. Recipient receiving the encrypted file a) The Recipient will then see a File Download window on their screen see in the figure below. Click the Open or Save button to progress. b) The Recipient enters the password they registered in Section 5 above, in thepassword window see the figure below. Then click the OK button. 9. Recipient accesses the decrypted Attachments may be found at the bottom of the PDF or in a column to the left of the content, depending on the version of Adobe Reader used see in the figure below. NOTE: To remove the need to constantly re-enter the password for the PDF, the attachments can be saved to the Recipient s file store. As a further test the initial document sent will always be this guide. Once you have downloaded the attachment and confirmed that it is this guide you will then be free to use the reply service to send encrypted attachment to the LES mailbox.
7 10. Recipient replies with an encrypted a) The Recipient clicks on the Reply button and the figure belowmay be displayed, depending on the security settings within the Recipient s organisation. b) Click on the Allow button to progress. NOTE: By ticking the Remember my action for this site box, this action will not be required for further s from this service. NOTE: The Reply functionality to a particular is limited to 30 days from the date of issue. Please request another secure from the Sender if it is beyond the 30 days and your response contains sensitive information. It is the responsibility of the sender to ensure the reply is in date as any transmission of data via insecure means will result in an information governance breach. 11. Recipient composing reply Enter the content of the reply as normal see the figure below.
8 12. Recipient adding attachments a) To add an attachment (your test form), click on the Browse button and navigate to the file to be attached as per the normal operating system browsing method. b) Once selected, click the Upload button. This will display the uploaded file in the Attachments column see the figure below. c) Repeat this process for all files that need to be attached. Attached files can be removed by clicking the tick box beside the relevant file and clicking Delete to remove the attachment. Click the Done button to return to Recipient sending the encrypted reply The attachment(s) added from Section 12 is displayed.click on the Send button.unselect the Send me a secure copy if a copy is not required. NOTE: This service does not save a copy to the Sent Items folder, therefore if confirmation that the was sent is required, this box should be left ticked.
9 14. Recipient receives sent confirmation The Recipient will receive a confirmation window if the message is sent successfully. 15. Sender receives reply from recipient Replies received from the Recipient will be decrypted automatically by the HSC Encrypted Service and then forwarded into the Sender s mailbox see figure below. 16. Recipient resetting the password a) If a Recipient believes their password to be compromised they can reset their password using the appropriate link from a previously received encrypted from the HSC Secure Service. The links are found in the body of see figure below. NOTE: The Recipient can only use an sent to them as the links contain references to their address. NOTE: All previous encrypted s will still require the old password to open.
10 b) To change the password, click the appropriate link, enter the Current password, and then the new password in the Password and Confirm Password fields see figure below. c) Once the password criteria are meet i.e. all have a against them, click the Change Password button to complete the process. The Recipient can also update the password change/recovery questions by ticking the box see figure below. d) The Change Password button will remain greyed out until all 3 answers are entered. NOTE: The previous answers can be re-entered. Notification will be displayed when the password has been successfully changed see figure below.
11 17. Recipient recovering the password a) If a Recipient forgets their password they can recover it by using the appropriate link from a previously received encrypted from the HSC Secure Service. The links are found in the body of see figure below. NOTE: The Recipient can only use an sent to them as the links containreferences to their address. b) The following window will open in the default internet browser see figure below. c) Click on the Send password Question(s) button to send them to your address. On successful completion a notification will be displayed in the internet browser see figure below. d) The Recipient will receive an with a link to preset questions see figure below.
12 e) A new internet browser window will open to allow entry of the answers to the preselected questions and the option to recover or reset the password. Enter the 3 answers, select Recover my password and click the Submitbutton. NOTE: When an answer is entered incorrectly, the screen will be reset and Invalid answer will be displayed in place of Answer the password question(s) to reset or recover your password. f) The screen will display a temporary one time password (circled in red) that therecipient will need to use to open a new encrypted that will contain theirpassword see figure below. g) The Recipient must now open the with a subject title - SPX Password Recovery Request Information from Health Social Care (NorthernIreland). h) Open the attached PDF attachment see Section 7 for further details if required. The PDF will contain their password.note: It is recommended that this message is deleted immediately after thepassword has been confirmed.
13 18. Expiration dates for s and accounts After 30 days unused Recipient accounts/passwords will be deleted. TheRecipient will need to register again for any new they receive.after 30 days the Recipient will not be able to make a secure response. A newencrypted will need to be sent from the Sender.After 10 days the will be deleted if the Recipient has not registered. Anotification is forwarded to the Sender informing them of this. A newencrypted will need to be sent from the Sender if needed. 19. Who to contact for queries and problems If you are experiencing issues or have any queries about the HSC Secure Service you should make contact in the first instance via the LES mailbox and mark your mail for the attention of the Dental and Ophthalmic Manager. 20. Subsequent actions Once your test forms have been received they will be processed by the BSO and once validated sent for payment as agreed within the LES.
Receiving Secure Email Customer Support frequently asked questions
Registering a Secure Password Q. Where do I find the current Secure email guidance documentation? A. Published on Glasgow City Council website. Q. My organisation has its own email encryption tool, do
More informationSecure Email - Customer User Guide How to receive an encrypted email
How to receive an encrypted email This guide has been developed for customers/suppliers of Glasgow City Council who are due to receive sensitive information from us. It will explain how to use our secure
More informationFDIC Secure Email Procedures for External Users April 23, 2010
FDIC Secure Email Procedures for External Users April 23, 2010 This document contains information proprietary to the Federal Deposit Insurance Corporation. Table of Contents 1. Introduction...2 2. Receiving
More informationSecure Message Center User Guide
Secure Message Center User Guide Using the Department of Banking Secure Email Message Center 2 Receiving and Replying to Messages 3 Initiating New Messages 7 Using the Address Book 9 Managing Your Account
More informationEssex Contractor Services Agency. Ophthalmic Statement. Decryption Software
Essex Contractor Services Agency Ophthalmic Statement Decryption Software Author: Jamie Everitt Owner: Zoe Tipple Version History Version: Issue Date Review Notes Date Draft 18/06/2015 For approval Approved
More informationHoneywell Secure Email External User Guide August 2013
Honeywell Secure Email External User Guide August 2013 PAGE: 1 of 14 Chapter No Table of Content Page No 1 Introduction 3 2 Using the Honeywell Secure Email Interface 3 3 Sending an Encrypted Email to
More informationMSGCU SECURE MESSAGE CENTER
MSGCU SECURE MESSAGE CENTER Welcome to the MSGCU Secure Message Center. Email is convenient, but is it secure? Before reaching the intended recipient, email travels across a variety of public servers and
More informationP309 - Proofpoint Encryption - Decrypting Secure Messages Business systems
Procedure P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems P309 - Page: Page 1 of 12 Date of Release: 23 February 2011 Status: Final Document Reference: Title: P309 Release Number:
More informationU.S. Bank Secure Mail
U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email
More informationSecure Email User Guide. Guidance for Recipients of Secure Email Messages from Lloyds Banking Group
Guidance for Recipients of Secure Email Messages from Lloyds Banking Group Version: 1.3 Last updated: 14/04/2016 1 Introduction This user guide is intended for third party email users users who receive,
More informationExternal End User Training Guide: Secure Email Extract
External End User Training Guide: Secure Email Extract Version 6 August 12, 2013 Prepared by 7/29/2013: Kris Chromey, Training Coordinator Michelle Tuscher, Vault Implementation Coordinator Edited for
More informationDATA PROTECTION. OneWorld Encrypted Messages USER GUIDE
DATA PROTECTION OneWorld Encrypted Messages USER GUIDE Table of Contents 1 Why use Encrypted emails?... 3 2 Activation and Login... 4 2.1 Activating Your New OneWorld Encrypted Messages Account... 4 2.2
More informationReceiving Secure Email from Citi For External Customers and Business Partners
Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure
More informationUsing the PeaceHealth Secure E-mail System
1 PeaceHealth is using a Secure E-mail System that allows for secure E-mail communications between individuals with a PeaceHealth E-mail address and individuals with E-mail addresses outside the PeaceHealth
More informationE Mail Encryption End User Guide
E Mail Encryption End User Guide TABLE OF CONTENTS Why Use Email Encryption... 2 What is a Registered Envelope... 2 Features & Benefits... 2 Security Policies... 2 How to Compose and Send an Encrypted
More informationRegions Secure Webmail. Instructions
Regions Secure Webmail Instructions Regions Bank Member FDIC Revised 092015 REGIONS SECURE WEBMAIL Regions has established privacy guidelines to protect customers, vendors, and associates of Regions Bank.
More informationGRS Advantage Website User Reference Guide
GRS Advantage Website User Reference Guide This document describes how to use the GRS Advantage Website. Table of Contents GRS Advantage Website... 2 Accessing the Website... 2 Requesting Access to the
More informationGuidance for sending and receiving an encrypted NHSmail e-mail
Contents Guidance for sending and receiving an encrypted NHSmail e-mail Introduction 2 Sending an encrypted e-mail to a VERIFIED e-mail address 2 Receiving an encrypted e-mail 4 Reply to and forward encrypted
More informationEmail Security Enhancements 3/9/15
Email Security Enhancements 3/9/15 CU Recovery and The Loan Service Center recently implemented security enhancements to our email system. This feature allows emails containing sensitive data to be securely
More informationSecure Mail Registration and Viewing Procedures
Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email
More informationNationstar Mortgage Secure Email Client User Guide
Nationstar Mortgage Secure Email Client User Guide A Guide to Exchanging Secure Emails Using the Nationstar Mortgage Secure Email Message Center Version 1.0 July 2010 1 Nationstar Public Copyright Information
More informationEJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8
EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8 External Users Decrypting Secure Messages The following sections describe how users external to EJGH receive and decrypt secure messages. Reading
More informationOrbital ATK Secure Email: Receiving Encrypted Messages. Why Orbital ATK Secure Email? Initial Email: Orbital ATK Secure Email Notification
Orbital ATK Secure Email: Receiving Encrypted Messages This document is intended for Orbital ATK Employees, Partners & Clients as an introduction & instructional user guide for Orbital ATK Secure Email.
More informationDirectory and Messaging Services Enterprise Secure Mail Services
Title: Directory and Messaging Services Enterprise Secure Mail Services Enterprise Secure Mail Services for End Users Attention: Receivers of Secure Mail Retrieval of Secure Mail by the Recipient Once
More informationTriCore Secure Web Email Gateway User Guide 1
TriCore Secure Web Email Gateway User Guide This document provides information about TriCore Secure Web Email Gateway. This document is for users who are authorized to send and receive encrypted email
More informationSecure Email A Guide for Users
Secure Email A Guide for Users October 14, 2013 10/13 TABLE OF CONTENTS USING THE SYSTEM FOR THE FIRST TIME... 3 EMAIL NOTIFICATION OF SECURE INFORMATION... 3 GETTING REGISTERED ON THE SYSTEM... 4 ACCOUNT
More informationInstructions For Opening UHA Encrypted Email
Receiving Encrypted Email You have received a secure, encrypted message from UHA. The message will contain the following notice and an attachment named SecureMessageAtt.hml. The attachment is shown circled
More informationHMRC Secure Electronic Transfer (SET)
HMRC Secure Electronic Transfer (SET) How to use HMRC SET using PGP Desktop Version 2.0 Contents Welcome to HMRC SET 1 HMRC SET overview 2 Encrypt a file to send to HMRC 3 Upload files to the Government
More informationSecure Mail Message Retrieval Instructions
2015 Secure Mail Message Retrieval Instructions IT Security University Medical Center 1/26/2015 Table of Contents INTRODUCTION... 3 REGISTRATION MESSAGES... 3 RETRIEVING THE SECURE EMAIL... 4 SECURE MESSAGE...
More information10/28/2013. Partners Zixmail Web Portal. Provider Training. Let s Get Started!
Partners Zixmail Web Portal Provider Training Let s Get Started! 1 Setting Up Your Partners Zixmail Web Portal There are two methods to begin this process. Option #1 Use the link on the Partners Provider
More informationSecure Email Actions for Email Recipients
Secure Email Actions for Email Recipients Actions for Email Recipients The recipient cannot forward encrypted email outside the secure system. Each email will only be available to the recipient for 30
More informationEBMS Secure Email. February 11, 2016 Instructions. Version 2
February 11, 2016 Instructions Version 2 Table of Contents Secure Email Upgrade... 3 Receiving Secure Email... 3 Viewing Past Secure Emails... 3 One-Time Registration... 4 Registration Screen... 5 Viewing
More informationStewart Secure Email User Guide. March 13, 2015
Stewart Secure Email User Guide March 13, 2015 Table of Contents Introduction... 1 What is secure email?... 1 Why secure email?... 1 What is personal, non-public information?... 1 How is my data protected?...
More informationOutlook Web Access (OWA) with Exchange Server 2007 (Windows version)
Outlook Web Access (OWA) with Exchange Server 2007 (Windows version) 1. Login into your Baylor email account via a web browser such as Internet Explorer, Fire Fox, or Netscape. The web URL is still http://mail.baylor.edu/
More informationProofpoint provides the capability for external users to send secure/encrypted emails to EBS-RMSCO employees.
Proofpoint provides the capability for external users to send secure/encrypted emails to EBS-RMSCO employees. To create a new email message to be sent securely to an EBS-RMSCO employee: 1. Click on the
More informationCan I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.
How does Secure E-mail work? When an e-mail is initiated or responded to the secure e-mail algorithm will determine if the e-mail needs to be encrypted based on predefined criteria. If it meets the predefined
More informationPage 1 Rev Date: February 2010. User Manual for Encrypted Email Services
Page 1 User Manual for Encrypted Email Services Instructions for Using Encrypted Email Services This document is being provided to assist you in opening encrypted emails sent from Century Bank. The following
More informationFigure 1. Deskguide Tumbleweed External User Instructions Page 1 of 5
This document provides instructions for communicating with the (DSS) through secure email, also known as Tumbleweed. It will tell you how to: 1. Know that you have received a secure email and how to access
More informationSecure Email Frequently Asked Questions
Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support
More informationEncryption. Introduction to using 7-Zip
IT Services Training Guide Encryption Introduction to using 7-Zip It Services Training Team The University of Manchester email: its.training@manchester.ac.uk www.itservices.manchester.ac.uk/trainingcourses/coursesforstaff
More informationRecipients Guide for Email Encryption Version 1.2
Recipients Guide for Email Encryption Version 1.2 Document Location n/a Copies can be requested from the IT Dept 01603 50 8622 Revision Previous Revision by Summary of Changes Version date revision date
More informationWelcome to HomeTown Bank s Secure E-mail! User Guide
Welcome to HomeTown Bank s Secure E-mail! User Guide To access the secure email message center, click the Secure Email link on the www.htbmn.com main web page. Select whether you are a new user of the
More informationMSI Secure Mail Tutorial. Table of Contents
Posted 1/12/12 Table of Contents 1 - INTRODUCTION... 1-1 INTRODUCTION... 1-1 Summary... 1-1 Why Secure Mail?... 1-1 Which Emails Must Be Encrypted?... 1-2 Receiving Email from MSI... 1-2 Sending Email
More informationSecure Email Client Guide
PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing
More informationEncrypted Email Users Guide. Revised 6/8/2015
Encrypted Email Users Guide Revised 6/8/2015 Contents Encrypted email service overview Registering, activating and maintaining an account Online Help Accessing the encrypted email portal screens Downloading
More informationHow To Send An Encrypted Email To The State From The Outside (Public)
Section 1. How to Send an Encrypted E-mail from the Private Network/State Employee The following conditions must be true to send an encrypted e-mail using Proofpoint e-mail encryption: Your State Agency
More informationOutlook Web Access User Guide
Table of Contents Title Page How to login...3 Create a new message/send attachment...5 Remove the reading pane...10 Calendar functions...11 Distribution lists...11 Contacts list...13 Tasks...18 Options...19
More informationUSC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9
About ShareFile When you wish to send someone a file or need a file from someone else, your best option is to use ShareFile. It not only provides increased security by automatically encrypting files but
More informationWebsense Secure Messaging User Help
Websense Secure Messaging User Help Welcome to Websense Secure Messaging, a tool that provides a secure portal for the transmission and viewing of sensitive, personal data in email. Use the portal to view
More informationOutlook Web Access E-mail
Outlook Web Access E-mail A. Accessing the mailbox via the Internet 1. Open your browser Firebox or Internet Explorer 2. In the URL address location box, key mail.asbury.edu for students and mail2.asbury.edu
More informationOptum Patient Portal. 70 Royal Little Drive. Providence, RI 02904. Copyright 2002-2013 Optum. All rights reserved. Updated: 3/7/13
Optum Patient Portal 70 Royal Little Drive Providence, RI 02904 Copyright 2002-2013 Optum. All rights reserved. Updated: 3/7/13 Table of Contents 1 Patient Portal Activation...1 1.1 Pre-register a Patient...1
More informationNCH Secure Web Delivery Instructions
NCH Secure Web Delivery Instructions Typically when you send an email to a person, it is sent in Clear Text and can be viewed as it traverses the internet. Email is typically not considered a good vehicle
More informationMUTUAL OF OMAHA SECURE EMAIL SYSTEM CLIENT/PARTNER USER GUIDE
MUTUAL OF OMAHA SECURE EMAIL SYSTEM CLIENT/PARTNER USER GUIDE Mutual of Omaha Secure Email Client/Partner User Guide April 2015 TABLE OF CONTENTS INTRODUCTION 3 About this Guide 3 CREATING A MUTUAL OF
More informationVanguard Secure E-Mail Service (VSES) User Guide
Vanguard Secure E-Mail Service (VSES) User Guide Information Security Department January 8, 2013 Contents Guide for Users of Secure E-Mail From Vanguard 1 View Secure E-Mail 1 New Registration 3 Compose
More informationInfocare Parent Portal
Introduction Infocare Parent Portal The Parent Portal is a fantastic tool which allows the parents and contacts to use the internet to securely see the learning experiences of their children, newsletters,
More informationGCSx Email Guide for Internal Users. How to send sensitive business and personal information securely
GCSx Email Guide for Internal Users How to send sensitive business and personal information securely Document control Description Version V.2 Created May 2013 GCSx Email Guide for Internal Users Status
More informationADP Secure Email Client User Guide
ADP Secure Email Client User Guide A Guide to Exchanging Secure Emails Using the Voltage SecureMail System Version 1.0 July 2008 2008 ADP, Inc. Copyright Information ADP provides this publication as is
More informationEnd-User Reference Guide
Guide Websense Advanced Email Encryption v7.6 Websense Advanced Email Encryption Copyright 1996-2011 Websense, Inc. All rights reserved. This document contains proprietary and confidential information
More informationEnd-User Reference Guide
Guide Websense Advanced Email Encryption v7.6 Contents Receiving secure email....................................... 1 How do I open a secure message?............................ 1 How do I register for
More informationInstructions for Secure Email Cisco Registered Envelope Service (CRES)
Instructions for Secure Email Cisco Registered Envelope Service (CRES) Please read the official Cisco Guidance on the Cisco Registered Envelope Service And Frequently Asked Questions A courtesy attempt
More informationGroupWise Web Access 8.0
GroupWise Web Access 8.0 How to check your email via the Internet For More Information, please contact: Administrative Office of the Courts Technology Help Desk (615) 532 9503 or (800) 448-7980 Table of
More informationMOVEit Encrypted File Transfer
MOVEit Encrypted File Transfer User Manual August 2014 Contact: Information Security security@siu.edu Table of Contents 1. OVERVIEW... 3 2. ACCESSING MOVEIT... 4 3. INSTALLING THE MOVEIT UPLOAD/DOWNLOAD
More informationFTP-Stream Module: InstantShare End User Guide
FTP-Stream Module: InstantShare End User Guide InstantShare Overview InstantShare is an easy way to quickly share large files to external partners and to request them to send files back to you. But unlike
More informationRSCCD REMOTE PORTAL TABLE OF CONTENTS: Technology Requirements NOTE
RSCCD REMOTE PORTAL The RSCCD Remote Portal allows employees to access their RSCCD Email (via Outlook Web Access), Department (Public) Folders, Personal (H Drive) Folder, and the District Intranet from
More informationBorough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments
Borough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments V8 Contents What is Encryption?...3 Why do I need to know about it?...3 How do I use it?...3 What
More informationBTC STUDENT EMAIL GUIDE
BTC STUDENT EMAIL GUIDE All students have a BTC email account. If you are unable to access your account, please contact your instructor. Student Email Each student has an email account. Your email address
More informationSEC External Guide for Using Accellion
Securities and Exchange Commission Office of Information Technology SEC External Guide for Using Accellion The Securities and Exchange Commission National Exam Program Hotline (202) 551-3925 Washington,
More informationNovo Nordisk Secure File Transfer User Guide
hehe Novo Nordisk Secure File Transfer User Guide Table of Contents 1. Purpose of this document... 2 2. Getting Access... 2 3. Installing the Upload/Download Wizard (first time only)... 2 4. Uploading
More informationEmail User Manual. [Outlook Web App 2013]
[Outlook Web App 2013] Central Information Systems Division March 2014 Table of Contents 1. To Login... 4 2. To Logout... 5 3. Change Password... 5 4. Email Messaging... 6 4.1 Create a New Mail... 6 4.2
More informationEmail Encryption User Guide
Email Encryption User Guide August, 2013 Adapted from: Cisco Registered Envelope Recipient Guide Cisco Systems, Inc. TABLE of CONTENTS Section 1: Overview of Email Encryption... 3 Page Section 2: Overview
More informationVoice Mail Online User Guide
Voice Mail Online User Guide Overview Welcome to the online version of SaskTel Voice Mail that is now accessible from any computer with Internet access You can listen to, sort, forward and/or delete your
More informationACCOUNT SERVICES HELP
ACCOUNT SERVICES HELP 1. How do I create an on line account? Before you can view your on line account information you first need to register a username profile. You do this by clicking on the Register
More informationBackground Information
User Guide 1 Background Information ********************************Disclaimer******************************************** This is a government system intended for official use only. Using this system
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationSEC External Guide for Using the E-mail Encryption Solution
Securities and Exchange Commission Office of Information Technology SEC External Guide for Using the E-mail Encryption Solution The Securities and Exchange Commission National Exam Program Hotline (202)551-3925
More informationA Framework for the Safe and Secure Use & Management of Community Pharmacy NHSmail email including Generic Mailboxes
A Framework for the Safe and Secure Use & Management of Community Pharmacy NHSmail email including Generic Mailboxes Contents 1 Introduction 3 2 NHSmail Acceptable Use Policy 3 3 Objectives 4 4 General
More informationIntroduction to Webmail for staff
Introduction to Webmail for staff Contents: Starting Webmail Login screen Your inbox Composing a message Attachments Replying to emails Forwarding a message Address book Deleting messages Automatic email
More informationHow to Send an Encrypted Email via KDADS' Outlook Client or Outlook Web Application
How to Send an Encrypted Email via KDADS' Outlook Client or Outlook Web Application In order to ensure Personal Health Information (PHI) and Personally Identifiable Information (PII) is protected, KDADS
More informationSecure Messaging (Direct) Training Manual
Secure Messaging (Direct) Training Manual 9D Revised 4.1.14 HealtheConnections Secure Messaging (Direct Mail) HealtheConnections Secure Messaging is a solution based on the Nationwide Health Information
More informationThe Toyota Foundation Grant Programs Guide for Web-based Grant Applications (Project Proposals)
The Toyota Foundation Grant Programs Guide for Web-based Grant Applications (Project Proposals) 1 1. Before Applying Please check the following before starting application processes via the Toyota Foundation
More informationNYS OCFS CMS Contractor Manual
NYS OCFS CMS Contractor Manual C O N T E N T S CHAPTER 1... 1-1 Chapter 1: Introduction to the Contract Management System... 1-2 CHAPTER 2... 2-1 Accessing the Contract Management System... 2-2 Shortcuts
More informationSecure Email User Guide
Secure Email User Guide Contents Secure email at HSBC. 2 About SecureMail... 2 Receiving a secure email sent via SecureMail 3 Opening a secure email sent via SecureMail... 4 Resetting your SecureMail password..
More informationHow To Use Exhange On Outlook 2007 2007 On A Pc Or Macintosh Outlook 2007 On Your Pc Or Ipad (For Windows Xp) On Your Ipad Or Ipa (For Your Windows Xp). (For A Macintosh) On A
Configure Microsoft Outlook 2007 to use Exchange Email Setting Important 1. Before configure your Microsoft outlook 2007 to use exhange you MUST log into the Web Exchange page to login and change your
More informationOnline Timesheets Guide for Contractors
Online Timesheets Guide for Contractors Table Of Contents 1. Welcome To Online Timesheets Page 2 2. Email Activation Page 2 3. Logging Onto The Online Timesheet Portal Page 2 4. Online Timesheet Portal
More informationTo open and/or save an attachment:
Secure Email Granite Group Benefits, LLC is fully committed to providing our clients with the safest and most secure environment for exchanging sensitive and/or private information via email. In order
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationSend and receive encrypted e-mails
Manual Send and receive encrypted e-mails Bank J. Safra Sarasin Ltd Document Owner Security Classification Document Type Bank J. Safra Sarasin Ltd internal and external use Manual Document change history
More informationEgress Switch Email Encryption User Guide
Egress Switch Email Encryption User Guide This guide explains how to use the Egress Switch email encryption software Egress Switch integrates with Microsoft Outlook to provide easy to use email encryption.
More informationHelp Administration (top right) > User Management > Add User Delete
GoEnbox is a web-based encrypted email service for Settlement Service providers and Small Businesses. You can use GoEnbox to communicate securely with users outside your organization. Contents Topics for
More informationS-Doc User Guide. Instructions on using the Secure Document Online Courier with the CAAT Pension Plan. September 2012
S-Doc User Guide Instructions on using the Secure Document Online Courier with the CAAT Pension Plan Secure solution provided by Accellion September 2012 S E C U R E C O L L A B O R A T I O N U S E R G
More informationADP Secure Email Client User Guide
ADP Secure Email Client User Guide A Guide to Exchanging Secure Emails Using the Voltage SecureMail System Version 1.6 August 2014 ADP Secure Email Client User Guide August 2014 Copyright Information ADP
More informationUsing Your New Webmail
1 Using Your New Webmail Contents Compose a New Message... 3 Add an Attachment... 5 Insert a Hyperlink... 6 Forward an Email... 7 Search Email... 8 Download Email from an existing POP3 Account... 9 Move
More informationSECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011
SECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011 Introduction In October, 2008, the Division of Welfare and Supportive Services (DWSS) announced the introduction of secure e-mail through ASM 17-08.
More informationSecure Messaging Service
Human Resources Secure Messaging Service Receiving Secure Emails from West Berkshire Council Table of Contents What are Secure Messaging notifications?... 3 How do I set up my Secure Messaging account?...
More informationSecuremail User Guide
Securemail User Guide Created: 2009-02-17 Updated: 2013-07-05 - New links and Address Book instructions Updated: 2014-04-23 - http://dhhs.ne.gov/documents/dhhs-securemail-userguide.pdf 1 INDEX: How Securemail
More informationMikogo User Guide Linux Version
Mikogo User Guide Linux Version Table of Contents Registration 3 Downloading & Running the Application 4 Start a Session 5 Join a Session 6 Features 7 Participant List 7 Switch Presenter 8 Remote Control
More informationEMAILING USING HOTMAIL
EMAILING USING HOTMAIL Signing into Your Email Account Open up explorer and type in www.hotmail.com in the address bar. Enter your email address. Hit the tab key on the keyboard and enter your password.
More informationWord Secure Messaging User Guide. Version 3.0
Word Secure Messaging User Guide Version 3.0 Copyright 2007-2013 WordSecure, LLC. All Rights Reserved. Page 1 of 7 1. Introduction Word Secure Messaging is a program that allows you to exchange encrypted
More informationMerchant Portal Guide. TradeRoute Copyright 2014. All Rights Reserved.
Merchant Portal Guide TradeRoute Copyright 2014. All Rights Reserved. TradeRoute Merchant Portal User Manual Table of Contents TradeRoute Merchant Account Portal Login Instructions... 3-4 Recovering your
More information