Borough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments
|
|
- Sydney Watts
- 4 years ago
- Views:
Transcription
1 Borough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments V8
2 Contents What is Encryption?...3 Why do I need to know about it?...3 How do I use it?...3 What should the recipient expect?...4 Passwords...4 Who can read them...5 What items should be encrypted?...5 Assisting the Recipient...6 Typical Issues and Actions...7 Receiving & Managing Encrypted s...8 Notes about encryption...8 What s will and will not be encrypted?...8 Dos and Don ts...8 MY NOTES Page 2 of 10
3 What is Encryption? It is a way of making information unreadable to anyone without authorised access. It is not the same as using a password to protect a document encryption is a more secure option, and is routinely used by many organisations. The encryption system used by the Borough of Poole (BoP) is known as the Cisco Registered Envelope Service (CRES), or Cisco Ironport, and came into effect in March Decryption is the means by which a secure message may be opened to read the content. Why do I need to know about it? Sensitive information - such as patient and service user data, National Insurance numbers, etc is known as Person Identifiable Data (PID). This type of information is at risk of being intercepted or read by unauthorised individuals when it is sent in an (or an attachment) over the internet, and must be protected. Encryption is the safest and simplest way to achieve this. There are no additional charges associated with using this service and likewise there is no additional charge for the recipient. It also ensures we comply with our Information Governance requirements, the Data Protection Act, and the principles of the Caldicott Report. How do I use it? To send an with sensitive information (PID) to an external address (i.e. not a poole.gov.uk address), the must be marked Confidential in the Message Options box. To do this first compose the , then click either on: The Message tab > Options group > dialogue launcher arrow The Options tab > More Options group > dialogue launcher arrow... and set message Sensitivity to Confidential (as shown on the next page). Message Tab... Options group OR Options Tab... More Options group Page 3 of 10
4 Message Options box Do NOT use this option Illustration 2 The and any attachments are now ready to send. What should the recipient expect? The first time your recipient receives an encrypted from the Borough of Poole they will have to register with the CRES, for which there is no charge. The they receive will guide them on how to do this, and their employer/in-house ICT dept should provide any additional support. However a supplementary Private & Voluntary sector guide also exists for their use see Assisting the Recipient on pages 6 & 7 of this guide. Registration is a one-time only activity, and thereafter they will only have to enter their password key (which they set when registering) to open subsequent encrypted s and their attachments. Passwords The Borough of Poole ICT Helpdesk cannot assist with lost or forgotten CRES passwords. If this happens the recipient must use the lost password link (shown right) which is included in the encrypted message they receive. See Assisting the Recipient on pages 6 & 7 of this guide. Page 4 of 10
5 Who can read them Once you have clicked Send, the will be intercepted by the encryption system and rendered unreadable except by the intended recipient(s). However they cannot be forwarded to the third party: if they are the will remain unreadable even if the third party recipient has already registered with the CRES service. Only those copied in to the original can open and read the content of the encrypted . All attachments in a confidential to an external address will be encrypted. This includes Adobe PDF and Word documents. Once sent you receive an automated confirmation (as right) that your message has been encrypted. If you the sender do not receive this, your has not been encrypted! Should this happen, contact the ICT help desk immediately. Note: the encryption system used by the Borough will scan for some keywords in outgoing s to help ensure no sensitive information is sent out unprotected: this includes attachments. You may therefore discover that the encryption system occasionally autoencrypts an or document containing text it has deemed to be confidential. Nevertheless, the responsibility always lies with YOU, the sender, to ensure such information is protected by selecting the Confidential message option in Outlook (as described on pages 3-4 above) What items should be encrypted? Any and/or document that contains PID (Personal Identifiable Data) which can identify someone or includes sensitive information about them - e.g.: health or social care information o including the fact that they are known to Social Services financial information personal information including: o names o addresses o phone numbers o bank account details o relationships or associations o behaviours o background information o case history o criminal records or questionable activities... and so on. Page 5 of 10
6 In additional it should only be sent to someone who has a genuine need to view the data. If in doubt ask yourself: Is the information, which I am about to , something I would be willing and comfortable to share if it related to me? Assisting the Recipient IMPORTANT: if the recipient is using a generic account, ie it is used by several members of staff, it is their responsibility to note down and store the password and answers to the security questions (created during the registration process) in a secure place where colleagues can access them should, for instance, the person who registered with CISCO then leave. If they have mislaid or forgotten their password, they should click the forgot password? link (as right) to prompt a link to their security questions. Five wrong attempts will lock them out for one hour. If they have forgotten/mislaid both the passwords and answers to their secret questions, they should or call them on BoP staff cannot request their password is reset for them. Recently, some NHS domains (addresses) have joined a scheme that auto-encrypts all traffic between BoP and themselves. HOWEVER, not all domains are included and ICT Security advises that all sensitive data should continue to be encrypted as above to all domains. The following page gives a summary of typical issues and actions Page 6 of 10
7 Typical Issues and Actions ISSUE External Recipient The recipient does not know the password associated with an e- mail address In addition to above, the recipient does not know the answers to the secret questions prompted by using the lost password link The recipient receives normal s, but not encrypted s When trying to save the attachment, the recipient receives various error messages: This type of attachment must be saved to disk. Right click the link and then click save target as to save the attachment. or: securedoc.html cannot access this file; check security privileges over the network drive The recipient receives an error message system is unavailable, try again later, or they cannot type anything into the password field The recipient cannot progress beyond opening the securedoc.html attachment, eg the Open button does not appear; their address does not show in the To field; the password field does not show BoP Worker The BoP worker receives an error message relating to certificates when trying to encrypt an outgoing The BoP worker does not know their Ironport password nor the answers to their own secret questions prompted by using the lost password link ACTION They should use the lost password link on their . CISCO will send a New Password message to their address containing a link to their security questions. They should answer the questions to access the Create New Password page. If they answer incorrectly 5 times they will be locked out of their account for one hour. If they have not specified security questions, the New Password message contains a link to the Create New Password page. They should choose a new password, and use it to log in to their account. They need to reset their password and should requesting their account is reset (and include the address affected). OR they can phone CISCO on NOTE: Borough of Poole staff can ONLY request password resets for BoP staff. The user should also be reminded to keep their password and answers in a secure central place accessible by those who need to use it in the future. This is almost certainly a local issue such as a spam filter or pop-up blocker that needs addressing by their own ICT provider. May also refer user to page 10 of the P&V User guide on the BoP website. The user should first contact their own ICT provider as it is likely to be an issue with their local settings barring them from downloading encrypted data. This is probably a Java (computer software) issue that should be dealt with by the user s own ICT provider. They should forward the entire to In return they will receive an with a link to the encrypted message which they can open by entering their password They have probably clicked on the security settings button, rather than selecting the confidential flag as indicated in the user guide They should contact the ICT Help desk to raise a work order requesting CISCO initiate the process to reset the worker s password.
8 Receiving & Managing Encrypted s Separate instructions exist to guide users through the process of registering for the encryption service itself, enabling them to receive encrypted s from external sources. Click on the following link to access them. How to Register ~ click here to open the BoP website where the External Recipient (P&V) user guide can be downloaded on the top right of the screen. It includes instructions on registering for the service and managing received s. Notes about encryption Under the Data Protection Act and in line with the Caldicott Principles, the responsibility for protecting service-user information lies with each of us, especially when sharing this information with other authorised bodies. This includes our NHS partners, other Local Authorities and social care agencies. The encryption service is currently available to Borough of Poole Adult Social Care staff, as well as a small number of other service units. What s will and will not be encrypted? Only s which are marked Confidential in the Outlook Message Options AND are being sent to external addresses e.g. to or etc will be encrypted. Confidential s sent to Government Connect (GCSX) IDs will be encrypted Confidential s sent to internal BoP addresses will NOT be encrypted Confidential s sent to an internal address but not in Adult Social Care and then forwarded to an external address will NOT be encrypted Calendar appointment messages which contain sensitive information AND are being sent to external IDs will be encrypted Encrypted s forwarded to a 3 rd party will be unreadable to the recipient unless they were copied in on the original Dos and Don ts If there is any doubt always use the Confidential message option and encrypt the e- mail Never assume that someone else or the encryption system will handle confidentiality on your behalf Do copy (cc) other persons who you believe should have access to the information on a need to know basis, as other recipients of your will not be able to forward your encrypted message If a recipient of your encrypted message decides that someone else (a 3 rd party) should have access to the content of your message they may either: o Contact you as the sender to forward a copy to this 3 rd party / person o Copy the information from the decrypted message to their computer, then forward it themselves in a secure manner to this 3 rd party / person. Do not copy (cc) other recipients of a confidential message just in case
9 Remember: the responsibility for the secure transport of sensitive / confidential information rests with YOU, the sender. For more information on encryption please see the Ironport link on the ICT Security homepage. Manual links to further support (copy & paste links into browser): Cisco Customer Support: Guide: FAQs: Page 9 of 10
10 MY NOTES Page 10 of 10
Secure Email A Guide for Users
Secure Email A Guide for Users October 14, 2013 10/13 TABLE OF CONTENTS USING THE SYSTEM FOR THE FIRST TIME... 3 EMAIL NOTIFICATION OF SECURE INFORMATION... 3 GETTING REGISTERED ON THE SYSTEM... 4 ACCOUNT
Email Encryption User Guide
Email Encryption User Guide August, 2013 Adapted from: Cisco Registered Envelope Recipient Guide Cisco Systems, Inc. TABLE of CONTENTS Section 1: Overview of Email Encryption... 3 Page Section 2: Overview
Secure email. Instructions for Use
Secure email Instructions for Use Contents Introduction... 2 Opening an encrypted email... 3 Attachments... 7 Sending and Replying to emails... 8 Returning to and accessing your encrypted emails after
Secure Mail Registration and Viewing Procedures
Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email
E Mail Encryption End User Guide
E Mail Encryption End User Guide TABLE OF CONTENTS Why Use Email Encryption... 2 What is a Registered Envelope... 2 Features & Benefits... 2 Security Policies... 2 How to Compose and Send an Encrypted
Encrypt and Send Email Guide for Internal Users. How to send business or personally sensitive emails securely
Encrypt and Send Email Guide for Internal Users How to send business or personally sensitive emails securely Document control Description Encrypt and Send Email Guide for Internal Users Version V.2 Created
Secure Email Recipient Guide
Secure Email Recipient Guide Contents How to open your first Encrypted Message.... 3 Step-by-Step Guide to Opening Your First Envelope... 3 Step One:... 3 Step Two:... 4 Step Three:... 4 Step Four:...
Secure Email FAQs for External Stakeholders
Secure Email FAQs for External Stakeholders Ver: 07 November 2012 What is secure email and why am I getting encrypted emails from the IPCC? Why do I have to register to open a Registered Envelope? What
Orbital ATK Secure Email: Receiving Encrypted Messages. Why Orbital ATK Secure Email? Initial Email: Orbital ATK Secure Email Notification
Orbital ATK Secure Email: Receiving Encrypted Messages This document is intended for Orbital ATK Employees, Partners & Clients as an introduction & instructional user guide for Orbital ATK Secure Email.
SECURE Email User Guide
SECURE Email User Guide Receiving SECURE Email from Starion Financial Starion Financial is now offering an enhanced email encryption tool, IronPort PXE, which enables the email communication of sensitive
HertSFX. User Guide V2.04. Hertfordshire s Secure File Exchange Portal. (Jan 2014) HertSFX User Guide V2.04 Jan 2014 Page 1 of 17
Hertfordshire s Secure File Exchange Portal User Guide V2.04 (Jan 2014) HertSFX User Guide V2.04 Jan 2014 Page 1 of 17 CONTENTS 1. About HertSFX... 3 2. HertSFX Limitations... 3 3. Getting Started... 3
EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8
EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8 External Users Decrypting Secure Messages The following sections describe how users external to EJGH receive and decrypt secure messages. Reading
Email Encryption. Cisco Ironport. using. Click here to begin
Email Encryption using Cisco Ironport Click here to begin Contents Sending an encrypted email Receiving an encrypted email - Registering with Cisco - Opening the email (after registration) Replying to
Proofpoint Email Encryption Manual. 18 July 2014
Proofpoint Email Encryption Manual 18 July 2014 Table of Contents Table of Contents... 2 Why did I Receive an Encrypted Email?... 3 Registering to Open an Encrypted Email for the First Time... 3 Opening
Welcome to HomeTown Bank s Secure E-mail! User Guide
Welcome to HomeTown Bank s Secure E-mail! User Guide To access the secure email message center, click the Secure Email link on the www.htbmn.com main web page. Select whether you are a new user of the
Securemail User Guide
Securemail User Guide Created: 2009-02-17 Updated: 2013-07-05 - New links and Address Book instructions Updated: 2014-04-23 - http://dhhs.ne.gov/documents/dhhs-securemail-userguide.pdf 1 INDEX: How Securemail
P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems
Procedure P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems P309 - Page: Page 1 of 12 Date of Release: 23 February 2011 Status: Final Document Reference: Title: P309 Release Number:
Secure Email Frequently Asked Questions
Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support
Instructions for Secure Email Cisco Registered Envelope Service (CRES)
Instructions for Secure Email Cisco Registered Envelope Service (CRES) Please read the official Cisco Guidance on the Cisco Registered Envelope Service And Frequently Asked Questions A courtesy attempt
How To Encrypt An Email From A Cell Phone To A Pc Or Ipad (For A Partner) With A Cisco Email Encryption Solution (For Partners)
New PHI & PII E-mail Encryption Solution (Partner Notification) In a continuing effort to utilize the advantages of email security while at the same time protecting clients private information, the Department
Encrypted Email Users Guide. Revised 6/8/2015
Encrypted Email Users Guide Revised 6/8/2015 Contents Encrypted email service overview Registering, activating and maintaining an account Online Help Accessing the encrypted email portal screens Downloading
Secure Email User Guide. Guidance for Recipients of Secure Email Messages from Lloyds Banking Group
Guidance for Recipients of Secure Email Messages from Lloyds Banking Group Version: 1.3 Last updated: 14/04/2016 1 Introduction This user guide is intended for third party email users users who receive,
CISCO SECURE MAIL. External User Guide. 1/15/15 Samson V.
1/15/15 Samson V. 1. These instructions are for users who reside outside the University of Colorado Denver that receive encrypted emails from faculty or staff of UC Denver. As a part of our HIPAA compliance
GCSx Email Guide for Internal Users. How to send sensitive business and personal information securely
GCSx Email Guide for Internal Users How to send sensitive business and personal information securely Document control Description Version V.2 Created May 2013 GCSx Email Guide for Internal Users Status
U.S. Bank Secure Mail
U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email
Stewart Secure Email User Guide. March 13, 2015
Stewart Secure Email User Guide March 13, 2015 Table of Contents Introduction... 1 What is secure email?... 1 Why secure email?... 1 What is personal, non-public information?... 1 How is my data protected?...
FDIC Secure Email Procedures for External Users April 23, 2010
FDIC Secure Email Procedures for External Users April 23, 2010 This document contains information proprietary to the Federal Deposit Insurance Corporation. Table of Contents 1. Introduction...2 2. Receiving
Instructions For Opening UHA Encrypted Email
Receiving Encrypted Email You have received a secure, encrypted message from UHA. The message will contain the following notice and an attachment named SecureMessageAtt.hml. The attachment is shown circled
Secure Email User Guide Receiving Secure Email from Merchants Bank
Secure Email User Guide Receiving Secure Email from Merchants Bank Contents This document provides a brief, end-user overview of the Cisco Registered Envelope Service Email system which has been implemented
Honeywell Secure Email External User Guide August 2013
Honeywell Secure Email External User Guide August 2013 PAGE: 1 of 14 Chapter No Table of Content Page No 1 Introduction 3 2 Using the Honeywell Secure Email Interface 3 3 Sending an Encrypted Email to
Secure Email - Customer User Guide How to receive an encrypted email
How to receive an encrypted email This guide has been developed for customers/suppliers of Glasgow City Council who are due to receive sensitive information from us. It will explain how to use our secure
UC Irvine Health Secure Mail Message Center
UC Irvine Health Secure Mail Message Center UC Irvine Health is committed to protecting the privacy of its member s information, especially their protected health information (PHI). UC Irvine Health is
CUSTOMER PORTAL USER GUIDE FEBRUARY 2007
CUSTOMER PORTAL USER GUIDE FEBRUARY 2007 CONTENTS INTRODUCTION 1. Access to the system 2. Case Management 2.1 Create a case 2.2 Review & Access existing cases 2.3 Update a Case 2.4 Resolve and Close a
SecureMail User Guide
SecureMail User Guide Contents Secure email at HSBC. 2 About SecureMail... 2 Receiving a secure email sent via SecureMail 3 Opening a secure email sent via SecureMail... 4 Using SecureMail to reply to
Microsoft Outlook Quick Reference Sheet
Microsoft Outlook is an incredibly powerful e-mail and personal information management application. Its features and capabilities are extensive. Refer to this handout whenever you require quick reminders
How To Send An Encrypted Email To The State From The Outside (Public)
Section 1. How to Send an Encrypted E-mail from the Private Network/State Employee The following conditions must be true to send an encrypted e-mail using Proofpoint e-mail encryption: Your State Agency
This document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee.
Email Encryption User Guide Sterne Agee is committed to the security of your information. We have implemented Cisco Email Encryption to secure email communication so that only you can open it.* Questions?
How to Use Boston Private Bank s Secure Mail Service
1. ONE-TIME REGISTRATION PROCESS Prior to using the Secure Mail service for the first time, a user must initially register with the service by completing steps A thru E below: A. When a Secure Mail encrypted
Outlook Web Access (OWA) with Exchange Server 2007 (Windows version)
Outlook Web Access (OWA) with Exchange Server 2007 (Windows version) 1. Login into your Baylor email account via a web browser such as Internet Explorer, Fire Fox, or Netscape. The web URL is still http://mail.baylor.edu/
ACS Email Encryption Recipient Guide
ACS Email Encryption Recipient Guide ACS ENCRYPTION SERVICES / TRAINING AND AWARENESS ACS Email Encryption Recipient Guide Email Encryption Recipient Guide ACS A Xerox Company 2828 North Haskell Dallas,
Word Secure Messaging User Guide. Version 3.0
Word Secure Messaging User Guide Version 3.0 Copyright 2007-2013 WordSecure, LLC. All Rights Reserved. Page 1 of 7 1. Introduction Word Secure Messaging is a program that allows you to exchange encrypted
Version 4 Revised 5/2015
Email Encryption Manual Version 4 Revised 5/2015 This document provides information on sending, receiving, and saving encrypted emails using the WRC Group Message Center. Contents What is Email Encryption...
Email Using MSN Hotmail
Email Using MSN Hotmail lab 14 Objectives: Upon successful completion of Lab 14, you will be able to View email messages received in the Inbox Send email messages using the To, Cc, and Bcc fields Reply
E-mail Encryption Recipient Guidelines
E-mail Encryption Recipient Guidelines Canadian Western Bank Group Human Resources Department November 1, 2013 This reference guide was developed for training and reference use only. Any discrepancies
Secure Email User Guide
Secure Email User Guide Contents Secure email at HSBC. 2 About SecureMail... 2 Receiving a secure email sent via SecureMail 3 Opening a secure email sent via SecureMail... 4 Resetting your SecureMail password..
Encrypted Email Opening and Replying to a Secure Message
First Time User Registration Opening a Secure Encrypted Email Where to go for Help Frequently Asked Questions Information Technology Encrypted Email Opening and Replying to a Secure Message First Time
How to Guide Outlook Web Access 2010
How to Guide Outlook Web Access 2010 If you have questions about any of the items in this guide, contact the IS Service Desk at 85-2400 or 414-326-2400. Outlook Web Access (OWA) provides Web-based email
MSI Secure Mail Tutorial. Table of Contents
Posted 1/12/12 Table of Contents 1 - INTRODUCTION... 1-1 INTRODUCTION... 1-1 Summary... 1-1 Why Secure Mail?... 1-1 Which Emails Must Be Encrypted?... 1-2 Receiving Email from MSI... 1-2 Sending Email
SECURE EMAIL USER GUIDE OUTLOOK 2000
WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP
Overview of Registered Envelopes. Registered Envelope Notification Message
Overview of Registered Envelopes A Registered Envelope is a type of encrypted email message. Some Registered Envelopes are password-protected, while others are encrypted but do not require a password.
Proofpoint provides the capability for external users to send secure/encrypted emails to EBS-RMSCO employees.
Proofpoint provides the capability for external users to send secure/encrypted emails to EBS-RMSCO employees. To create a new email message to be sent securely to an EBS-RMSCO employee: 1. Click on the
Outlook Live Basics. for Students
Outlook Live Basics for Students 2 Outlook Live for Support Staff Outlook Live for Support Staff 3 Getting Started... 6 Signing into your Outlook Account... 6 Migrating your Account... 8 Address Book...
Guidance for sending and receiving an encrypted NHSmail e-mail
Contents Guidance for sending and receiving an encrypted NHSmail e-mail Introduction 2 Sending an encrypted e-mail to a VERIFIED e-mail address 2 Receiving an encrypted e-mail 4 Reply to and forward encrypted
FINRA DR Portal. User Guide for Arbitration and Mediation Case Participants
FINRA DR Portal for Arbitration and Mediation Case Participants December 2015 Disclaimer These materials are for training and instructional purposes only. No part of this publication may be reproduced,
Microsoft Outlook Web Access User Guide to Basic E-mail Features
Microsoft Outlook Web Access User Guide to Basic E-mail Features These notes provide the new user with the information necessary to use the basic E-Mail functions of Outlook s online Web Server. Information
How To Use The Gtokus Secure Mail System
Department of Banking and Finance (DBF) Secure Message Center DBF Secure E-Mail Procedures This document contains information proprietary to the Georgia Department of Banking and Finance and shall not
Registering at the Securemail site
Registering at the Securemail site Before using the Secure Mail service for the first time, you must perform a one-time service registration by completing the following steps. 1. When a Secure Mail is
A Framework for the Safe and Secure Use & Management of Community Pharmacy NHSmail email including Generic Mailboxes
A Framework for the Safe and Secure Use & Management of Community Pharmacy NHSmail email including Generic Mailboxes Contents 1 Introduction 3 2 NHSmail Acceptable Use Policy 3 3 Objectives 4 4 General
Children s Service. Secure Email Guide for external users
Children s Service Secure Email Guide for external users Contents 1. Secure email introduction 2. receiving a secure email for the first time 3. Logging on to the secure email portal 4. Changing your password
Email Quick-Start Guide
For TradeMark Media s email system Thank you for choosing TradeMark Media for your email hosting. You ve made a wise choice. TradeMark Media offers comprehensive spam and virus protection, POP3 and WebMail
GETTING STARTED WITH D2L
GETTING STARTED WITH D2L Quick Start Guide v.9.2.1 ecampus This guide provides tips for users new to using the D2L Learning Environment. It discusses how to navigate the main areas and how to change your
Receiving Secure Email from Citi For External Customers and Business Partners
Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure
This information can be made available in Large Print
Do you have a question about MyAccounts? Just click on the relevant question from the list below for further information. To download the documents on this page, you must have Adobe Acrobat Reader installed
Secure Email Actions for Email Recipients
Secure Email Actions for Email Recipients Actions for Email Recipients The recipient cannot forward encrypted email outside the secure system. Each email will only be available to the recipient for 30
1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6
MailTrack How To Document 27 March 2014 Table of Contents 1. How to Register... 2 2. Forgot Password... 4 3. Login to MailTrack Webmail... 5 4. Accessing MailTrack message Centre... 6 5. Creating a MailTrack
Government buyer user manual System Requirements and Administration Version 2.0
Queensland Government etendering website Government buyer user manual System Requirements and Administration Version 2.0 July 2011 etender Help Desk phone 07 3836 0141 Table of contents 1 Introduction...
SECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011
SECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011 Introduction In October, 2008, the Division of Welfare and Supportive Services (DWSS) announced the introduction of secure e-mail through ASM 17-08.
Using the Web email service
Using the Web email service This booklet describes the web based email service used by Sandwell schools. The web based email service was introduced in January 2005 to replace an earlier webmail system.
Page 1 Rev Date: February 2010. User Manual for Encrypted Email Services
Page 1 User Manual for Encrypted Email Services Instructions for Using Encrypted Email Services This document is being provided to assist you in opening encrypted emails sent from Century Bank. The following
Online Security Information. Tips for staying safe online
Online Security Information ProCredit Bank is committed to protecting the integrity of your transactions and bank account details. ProCredit Bank therefore uses the latest security software and procedures
Email at Bradford - Outlook
This document provides guidance for staff using Office 365 with Microsoft Outlook 2010 for email at the University of Bradford. The University of Bradford retains copyright for this material, which may
Accessing a Secure Message. Outside the COV Email Network
Stay Connected! Use this Guide to help you read encrypted Accessing a Secure Message messages from DHRM sent to a non-cov email address. Outside the COV Email Network Accessing a Secure Message Outside
A Guide to using egas Lead Applicant
A Guide to using egas Lead Applicant egas Browsers and Browser Settings Logging In Passwords Navigation Principles Your Contact Details Tasks Overview Completing Tasks egas The Health and Care Research
CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE
CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE INTRODUCTION You can access your email account from any workstation at your school using Outlook Web Access (OWA),
Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011
Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011 1 Options for encrypted e-mail communication with AUDI AG Confidential information may only be transmitted in encrypted form
Department of Behavioral Health (DBH) Staff. CaSonya Thomas, MPA, CHC, Director
Date November 18, 2015 To: (DBH) Staff From: CaSonya Thomas, MPA, CHC, Director Subject: Electronic Mail (e-mail) Encryption Introduction DBH's Office of Information Technology, in partnership with the
Focus On echalk Email. Introduction. In This Guide. Contents:
Focus On echalk Email Introduction Email can be very useful in a school setting. For instance, instead of writing out a memo and delivering it to everyone s mailbox in the main office, you can simply send
Outlook Web Access User Guide
Table of Contents Title Page How to login...3 Create a new message/send attachment...5 Remove the reading pane...10 Calendar functions...11 Distribution lists...11 Contacts list...13 Tasks...18 Options...19
MSGCU SECURE MESSAGE CENTER
MSGCU SECURE MESSAGE CENTER Welcome to the MSGCU Secure Message Center. Email is convenient, but is it secure? Before reaching the intended recipient, email travels across a variety of public servers and
All Colleagues Landing Page
INTERNAL USE ONLY All Colleagues Landing Page User's Manual Version 5 Table of Contents Login... 2 Password Features... 4 Expired password...4 Password reset...6 Region Selection... 8 Changing Your Region...8
User Guide May 2013. Using Certificates in Outlook Express
User Guide May 2013 Using Certificates in Outlook Express FIGU RES... FIGURES.... T I TL E..............................................................................................................................
TCS-CA. Outlook Express Configuration [VERSION 1.0] U S E R G U I D E
U S E R G U I D E TCS-CA Outlook Express Configuration [VERSION 1.0] C O N T E N T S 1 DESCRIPTION... 3 2 OUTLOOK EXPRESS AND CERTIFICATES... 4 3 ENABLING SECURITY SETTINGS FOR MAIL ACCOUNT... 5 3.1 Settings
Outlook Web Access An Introductory Guide
Outlook Web Access An Introductory Guide IT Training & Assessment Unit, Queen s University Belfast 1 Contents Logging on... 3 Email... 3 Compose a Message... 4 Saving an Email Attachment... 5 Saving a
How to access your email via Outlook Web Access
How to access your email via Outlook Web Access 1) Open your internet browser and type in the following address: www.law.miami.edu * Aol users must minimize their browser and use Internet Explorer 6.0+
Receiving Secure Email Customer Support frequently asked questions
Registering a Secure Password Q. Where do I find the current Secure email guidance documentation? A. Published on Glasgow City Council website. Q. My organisation has its own email encryption tool, do
Applying for Archive Service Accreditation: Using the online application system
Applying for Archive Service Accreditation: Using the online application system 1 Archive Service Accreditation online application system: user guide Table of Contents 1 Registering on the online application
Email Encryption at the University of Miami Miller School of Medicine and University of Miami Health System
Email Encryption at the University of Miami Miller School of Medicine and University of Miami Health System Introduction Email encryption is used to protect sensitive content that is sent from the UM Miller
Schools CPD Online General User Guide Contents
Schools CPD Online General User Guide Contents New user?...2 Access the Site...6 Managing your account in My CPD...8 Searching for events...14 Making a Booking on an Event...20 Tracking events you are
Instructions for approval of digital invoices
Instructions for approval of digital invoices Leiden University Instruction digital invoices Pagina: 1/17 Processing digital invoices Contents: 1 Processing digital invoices...3 1.1 Approving digital invoices...5
Lotus Notes Client Version 8.5 Reference Guide
Lotus Notes Client Version 8.5 Reference Guide rev. 11/19/2009 1 Lotus Notes Client Version 8.5 Reference Guide Accessing the Lotus Notes Client From your desktop, double click the Lotus Notes icon. Logging
The Cancer Institute NSW Grants Management System User Guide
The Cancer Institute NSW Grants Management User Guide Version 1.1 12 February 2016 Contents 1. Registration 2 2. Login to the Institute s GMS 3 3. Forgot password 3 4. The home page 4 5. Creating a profile
BlackBerry Internet Service. Version: 4.5.1. User Guide
BlackBerry Internet Service Version: 4.5.1 User Guide Published: 2014-05-22 SWD-20140522173857703 Contents 1 Getting started...7 About the messaging service plans for the BlackBerry Internet Service...7
Using Voltage SecureMail
Using Voltage SecureMail Using Voltage SecureMail Desktop Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending a secure email as easy as sending it without encryption.
Can I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.
How does Secure E-mail work? When an e-mail is initiated or responded to the secure e-mail algorithm will determine if the e-mail needs to be encrypted based on predefined criteria. If it meets the predefined
USER GUIDE. This user guide covers the following topics: Getting to know the email interface. Attaching a document to an email
LGfL EMAIL USER GUIDE This user guide covers the following topics: Logging on Getting to know the email interface Getting new messages Reading messages Writing a new message Attaching a document to an
Background Information
User Guide 1 Background Information ********************************Disclaimer******************************************** This is a government system intended for official use only. Using this system
THE LIMES MEDICAL CENTRE. Patient Access User Guide 2014. Edition 1
THE LIMES MEDICAL CENTRE Patient Access User Guide 2014 Edition 1 Patient Access Patient Access allows you to access The Limes Medical Centre s on-line and text messaging services. Patients can book routine
POLIC ANDP CEDURE. t/ 1 vhi4. Email Encryption 11/10/2018. Effective: 12/9/2015. HIPAA/Privacy. Policy. Last New policy Revised: Policy# 11.
Page 11 of 8 ALCOHOL, DRUG AND POLIC ANDP E T AL HEAL TH SERVICES CEDURE Section Sub-section Policy Compliance HIPAA/Privacy Policy# 11.xxx Email Encryption Director's Approval -+~,..._._-~"---------------
Vanguard Secure E-Mail Service (VSES) User Guide
Vanguard Secure E-Mail Service (VSES) User Guide Information Security Department January 8, 2013 Contents Guide for Users of Secure E-Mail From Vanguard 1 View Secure E-Mail 1 New Registration 3 Compose