Business Procedures: Send Secure s Created: Updated:
|
|
- Duane Boone
- 8 years ago
- Views:
Transcription
1 Business Procedures: Send Secure s Created: Updated: Page 1 of 10
2 Overview From time to time it is necessary to be able to share confidential information with school districts via . When such situations occur, it is important to ensure that communications are exchanged in the most secure manner possible. The Commonwealth provides a Send Secure feature to help ensure the security of confidential s. Confidential information includes all correspondence, including attachments, which contains personal information for a member or members, or which contains any other information that may not be considered public knowledge. In order to utilize the Commonwealth s Send Secure feature, the exchange must be initiated by a Commonwealth employee from a Commonwealth address (psersrep@pa.gov). Recipients can reply from within the Send Secure system but cannot generate Send Secure s without utilizing the respond feature unless they have another security process in place for use on their system. The following procedures will assist you in the process of receiving a Commonwealth Send Secure and in responding to the Send Secure . Page 2 of 10
3 Opening Secure s from a Non-Commonwealth Address Triggers Once recipients using non-commonwealth addresses have followed the instructions for registering to receive secure Commonwealth s per the document Encryption Desk Reference for Non-Commonwealth Users, the following instructions may be used for opening the resulting secure s and any applicable attachments. Steps 1) You will receive an notification indicating that a secure has been sent to you 2) Click on the securedoc icon in the lower left hand corner of the notification
4 3) Type your Password in the designated space and click on Open 4) A view of the secure will appear in a new window 5) If an attachment was included with the , the attachment will be listed below the Subject line. If no attachments were included, you may process and close the . If an attachment was included, double click on the attachment name to open the file and move to step 6. Page 4 of 10
5 6) If you opened an attachment, you will receive a pop-up window asking if you would like to Open or Save the file or cancel processing of the file. You may choose either of these options. Selecting Open or Save will give you access to the file, and you may then process the attachment just like any attachment from a normal . 7) Be sure to close all folders and internet browser windows as soon as you have finished processing the confidential information so that unauthorized parties cannot gain access to confidential information. This can be accomplished by Clicking on the red Xs in the upper right hand corner of each applicable screen Page 5 of 10
6 Replying to Secure s from a Non-Commonwealth Address Triggers Once recipients using non-commonwealth addresses have followed the instructions for registering to receive secure Commonwealth s per the document Encryption Desk Reference for Non-Commonwealth Users, the following instructions may be used for replying to secure s. In order for the reply to be sent securely, these instructions must be followed. Failure to comply with these instructions will result in s being sent devoid of added security features. Steps 1) Follow steps 1-4 In Appendix A: Opening Secure s from a Non-Commonwealth Address to log in to the Send Secure that you originally received. 2) Select Reply in the Send Secure view of the ; you can click on either occurrence of Reply or Reply All that appears on your screen. Page 6 of 10
7 3) Type your message in the body of the 4) If you do not need to attach a file to the Send Secure move to step 9; if you have a file to attach to the Send Secure reply, click on Attachments Page 7 of 10
8 5) Click on Add Files in the pop-up box 6) Highlight the file that you need to attach and click on Open Page 8 of 10
9 7) Highlight the file and click on Upload File 8) Click on Done Page 9 of 10
10 9) If you included an attachment, the Attachment will now appear under the subject line. Select Send; you can select either occurrence of Send that appears on your screen. 10) You will receive a message indicating that your was sent successfully 11) Be sure to close all folders and internet browser windows as soon as you have finished processing the confidential information so that unauthorized parties cannot gain access to confidential information. This can be accomplished by Clicking on the Xs in the upper right hand corner of each applicable screen Page 10 of 10
Employer s Reference Manual Chapter 19. Public School Employees Retirement System. Employers Reference Manual Chapter 19 Revised: 2/26/2015 i
Employer s Reference Manual Chapter 19 Public School Employees Retirement System 5 N. 5th Street Harrisburg PA 17101 1905 Phone 1.866.353.1844 Fax 717.772.3860 Email ContactESC@state.pa.us www.psers.state.pa.us
More informationDepartment of Alcohol & Drug Programs. Information Management Services Division (IMSD) EMAIL ENCRYPTION INSTRUCTIONS
Department of Alcohol & Drug Programs (IMSD) EMAIL ENCRYPTION INSTRUCTIONS July 1, 2010 Why Do We Need Email Encryption? Code of Regulations, Title 45, Subtitle A, Part 164 The Health Insurance Portability
More informationSecure Email Client User Guide Receiving Secure Email from Mercantile Bank
Receiving Secure Email from Contents This document provides a brief, end-user overview of the Secure Email system which has been implemented by. Why Secure Email? When someone sends you an email, the email
More informationBaylor Secure Messaging. For Non-Baylor Users
Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7
More informationTriCore Secure Web Email Gateway User Guide 1
TriCore Secure Web Email Gateway User Guide This document provides information about TriCore Secure Web Email Gateway. This document is for users who are authorized to send and receive encrypted email
More informationCLIENT PORTAL USER GUIDE
CLIENT PORTAL USER GUIDE JULY 28, 2011 At Gelman, Rosenberg & Freedman, CPAs we take the privacy and security of your information seriously. That's why we've introduced the Client Portal for sharing your
More informationVersion 4 Revised 5/2015
Email Encryption Manual Version 4 Revised 5/2015 This document provides information on sending, receiving, and saving encrypted emails using the WRC Group Message Center. Contents What is Email Encryption...
More informationGDC4S Dropbox User Guide
GDC4S Dropbox User Guide Contents Foreword... 1 Dropbox User Guides... 1 Sign On... 2 Your Home Page... 3 Create/Send a New Message... 4 Adding a Previously Used Recipient... 4 Adding a New to You User...
More informationSecure Mail Registration and Viewing Procedures
Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email
More informationSecure Email - Customer User Guide How to receive an encrypted email
How to receive an encrypted email This guide has been developed for customers/suppliers of Glasgow City Council who are due to receive sensitive information from us. It will explain how to use our secure
More informationHow To Open An Encrypted Email
Due to HIPAA requirements, HCDDS must implement a secure method for sending emails that contain information about individuals we serve to people outside the agency s secure network. To accomplish this,
More informationINFORMATION SYSTEMS SERVICE NETWORKS AND TELECOMMUNICATIONS SECTOR. User Guide for the RightFax Fax Service. Web Utility
INFORMATION SYSTEMS SERVICE NETWORKS AND TELECOMMUNICATIONS SECTOR User Guide for the RightFax Fax Service Web Utility August 2011 CONTENTS 1. Accessing the Web Utility 2. Change Password 3. Web Utility:
More informationFDIC Secure Email Procedures for External Users April 23, 2010
FDIC Secure Email Procedures for External Users April 23, 2010 This document contains information proprietary to the Federal Deposit Insurance Corporation. Table of Contents 1. Introduction...2 2. Receiving
More informationHOW TO USE OIT EMAIL VIA THE WEB
HOW TO USE OIT EMAIL VIA THE WEB A) Logging into your MyOIT account which includes your email account 1) Open a browser such as Firefox, Chrome or Safari. Please do not use Internet Explorer. 2) In the
More informationUSC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9
About ShareFile When you wish to send someone a file or need a file from someone else, your best option is to use ShareFile. It not only provides increased security by automatically encrypting files but
More informationNC State College GroupWise V.7 WebAcess Employee Email System
1 NC State College GroupWise V.7 WebAcess Employee Email System This document provides a quick overview of the basic GroupWise features available using the Web Browser interface. It contains the following
More informationHow to Use Boston Private Bank s Secure Mail Service
1. ONE-TIME REGISTRATION PROCESS Prior to using the Secure Mail service for the first time, a user must initially register with the service by completing steps A thru E below: A. When a Secure Mail encrypted
More informationCan I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.
How does Secure E-mail work? When an e-mail is initiated or responded to the secure e-mail algorithm will determine if the e-mail needs to be encrypted based on predefined criteria. If it meets the predefined
More informationConstant Contact User Manual
Constant Contact User Manual TIP: Check out Constant Contact s video tutorial on how to develop an email campaign: http://tinyurl. com/3nvrv7l How to use this guide To use this guide, you must first be
More informationDirectory and Messaging Services Enterprise Secure Mail Services
Title: Directory and Messaging Services Enterprise Secure Mail Services Enterprise Secure Mail Services for End Users Attention: Receivers of Secure Mail Retrieval of Secure Mail by the Recipient Once
More informationSchoolMessenger for iphone
The SchoolMessenger app lets you quickly and easily send messages from anywhere using your iphone. Setting up and using the application is simple. This guide will show you how! [Important: Before you can
More informationWakefield Council Secure email and file transfer User guide for customers, partners and agencies
Wakefield Council Secure email and file transfer User guide for customers, partners and agencies The nature of the work the council carries out means that we often deal with information that is sensitive
More informationUtilizing SASED OneDrive Cloud Storage
Utilizing SASED OneDrive Cloud Storage Technology Department 5/29/15 The purpose of this document is to provide guidance on how to transfer and access SASED documents and folders on your SASED provided
More informationSchools Remote Access Server
Schools Remote Access Server This system is for school use only. Not for personal or private file use. Please observe all of the school district IT rules. 6076 State Farm Rd., Guilderland, NY 12084 Phone:
More informationSecure Email Actions for Email Recipients
Secure Email Actions for Email Recipients Actions for Email Recipients The recipient cannot forward encrypted email outside the secure system. Each email will only be available to the recipient for 30
More informationMUTUAL OF OMAHA SECURE EMAIL SYSTEM CLIENT/PARTNER USER GUIDE
MUTUAL OF OMAHA SECURE EMAIL SYSTEM CLIENT/PARTNER USER GUIDE Mutual of Omaha Secure Email Client/Partner User Guide April 2015 TABLE OF CONTENTS INTRODUCTION 3 About this Guide 3 CREATING A MUTUAL OF
More informationHow To Encrypt An Email From A Cell Phone To A Pc Or Ipad (For A Partner) With A Cisco Email Encryption Solution (For Partners)
New PHI & PII E-mail Encryption Solution (Partner Notification) In a continuing effort to utilize the advantages of email security while at the same time protecting clients private information, the Department
More informationUsing the SB Partners Client Web Portal
Using the SB Partners Client Web Portal Note: These are instructions for clients of SB Partners LLP. Table of Contents Overview... 2 Receiving your username and password... 3 Logging on... 4 Navigating
More informationFTP-Stream Module: InstantShare End User Guide
FTP-Stream Module: InstantShare End User Guide InstantShare Overview InstantShare is an easy way to quickly share large files to external partners and to request them to send files back to you. But unlike
More informationAppendix A: Encrypting a File and / or Email Message
Appendix A: Encrypting a File and / or Email Message Encryption is defined as the conversion of something to code or symbols so that its contents cannot be understood if intercepted. USDB has approved
More informationThis document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee.
Email Encryption User Guide Sterne Agee is committed to the security of your information. We have implemented Cisco Email Encryption to secure email communication so that only you can open it.* Questions?
More informationSecure Message Center User Guide
Secure Message Center User Guide Using the Department of Banking Secure Email Message Center 2 Receiving and Replying to Messages 3 Initiating New Messages 7 Using the Address Book 9 Managing Your Account
More informationDirect Mail Training Manual
Direct Mail Training Manual 9D Revised 4.29.15 HealtheConnections Secure Messaging (Direct Mail) HealtheConnections Secure Messaging is a solution based on the Nationwide Health Information Network (NwHIN)
More informationSecure Messaging (Direct) Training Manual
Secure Messaging (Direct) Training Manual 9D Revised 4.1.14 HealtheConnections Secure Messaging (Direct Mail) HealtheConnections Secure Messaging is a solution based on the Nationwide Health Information
More informationWorking with H-drive, I-drive, and DropBox Files Online
Working with H-drive, I-drive, and DropBox Files Online Preamble: Students and Staff have both individual networked storage space (referenced on-campus as the H-drive) and shared storage space (referenced
More informationHallpass Instructions for Connecting to Mac with a Mac
Hallpass Instructions for Connecting to Mac with a Mac The following instructions explain how to enable screen sharing with your Macintosh computer using another Macintosh computer. Note: You must leave
More informationWord Secure Messaging User Guide. Version 3.0
Word Secure Messaging User Guide Version 3.0 Copyright 2007-2013 WordSecure, LLC. All Rights Reserved. Page 1 of 7 1. Introduction Word Secure Messaging is a program that allows you to exchange encrypted
More informationCitrus Valley Health Partners. Web Outlook User Guide. Table of Contents
Citrus Valley Health Partners Web Outlook User Guide Table of Contents Getting Started Page Access to Web Outlook... 1 Log in Instructions... 1 Basic Navigation... 1 The Menu Bar... 1 The Reading Pane...
More information1. Right click using your mouse on the desktop and select New Shortcut.
offers 3 login page styles: Standard Login, List Login or Quick Time Punch. Each login page can be saved as a shortcut to your desktop or as a bookmark for easy fast login access. For quicker access to
More informationTHE CHILDREN S HEALTH NETWORK CONTRACTING TOOL TRAINING MANUAL
THE CHILDREN S HEALTH NETWORK CONTRACTING TOOL TRAINING MANUAL 1 TCHN CONTRACTING TOOL TABLE OF CONTENTS 2 Overview 3 Step by Step Instructions 3 Logging In 4 The Main Menu Options 5 Creating Custom Lists
More informationEncrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption!
Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption Thisdocumentcontainsthenecessarystepstoencryptthecontentsofaharddrive usingbitlockerandwindows7. Thefollowinginstructionsarederivedfromdocumentationat:
More informationBank of Hawaii Protecting Confidential Email
1 Bank of Hawaii Protecting Confidential Email Email is commonly used to transmit confidential information such as operational data, legal documents, or financial information. By default emails are sent
More informationContents LOGIN. Order an Official Transcript National Student Clearinghouse Tutorial Page 1 of 9
National Student Clearinghouse Tutorial Page 1 of 9 Contents LOGIN... 1 ENTER PERSONAL INFORMATION... 2 SELECT RECIPIENT... 4 ENTER RECIPIENT DETAILS... 4 REVIEW ORDER... 5 PAYMENT PROCESS... 6 SIGN PAPERLESS
More informationGroupWise Web Access 8.0
GroupWise Web Access 8.0 How to check your email via the Internet For More Information, please contact: Administrative Office of the Courts Technology Help Desk (615) 532 9503 or (800) 448-7980 Table of
More informationBankNet Instructions for Large File Transfer. May 20, 2013 Version 1.1
May 20, 2013 Version 1.1 Table of Contents 1 Introduction... 1 2 Accessing the Secure Large File Transfer Tool... 2 3 Setting Your Email Address for Confirmation Notifications.. 7 4 Uploading a File...
More informationEdinburg CISD Technology Department Internet Part 3 Using Microsoft Exchange E-mail
Edinburg CISD Technology Department Internet Part 3 Using Microsoft Exchange E-mail I. Introductions and Objectives II. III. IV. Acceptable Use Policy & Exhibit C forms Logging in Procedures Exploring
More informationBackground Information
User Guide 1 Background Information ********************************Disclaimer******************************************** This is a government system intended for official use only. Using this system
More informationSecure E-Mail Management Guide. June 2008
Secure E-Mail Management Guide June 2008 What are Paychex Secure Messages? To enhance the security of client and vendor data, Paychex created the Paychex Secure E-mail Message Center, a Web site hosted
More informationEJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8
EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8 External Users Decrypting Secure Messages The following sections describe how users external to EJGH receive and decrypt secure messages. Reading
More information7. In the boxed unlabeled field, enter the last 4 digits of your Social Security number.
CREATE YOUR MYVIEW LOGIN To access myview while ensuring security, you will be given an encrypted access key token. You will use this token the first time you log into myview. Once you have successfully
More informationHelp Desk User Manual (Version 1.0)
Help Desk User Manual (Version 1.0) Table of Contents Accessing Infinity Technologies Help Desk Portal... 2 Logging into Infinity Technologies Help Desk Portal for the First Time... 3 Resetting Your Password...
More informationOutlook Web Access E-mail
Outlook Web Access E-mail A. Accessing the mailbox via the Internet 1. Open your browser Firebox or Internet Explorer 2. In the URL address location box, key mail.asbury.edu for students and mail2.asbury.edu
More informationUpon Installation, Soda
Upon Installation, Soda Prompts you to create your user profile to register for a new profile Note: Asks your for your particulars Prompts you to select a password. You would need to provide this password
More informationUsing Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
More informationHow to Use JCWHosting Reseller Cloud Storage Solution
How to Use JCWHosting Reseller Cloud Storage Solution Go to https://www.internetspace.co.za and log in with your Cloud Reseller account username and password. How to Use create a cloud account for your
More informationAccess your directories (home directory and shared directories) outside Tilburg University
Access your directories (home directory and shared directories) outside Tilburg University FileZilla offers you the possibility to access your personal M-drive or other network locations through a secure
More informationEnter your User Id and Password and click the Log In button to launch the application.
Working with CECAS How to Log In to CECAS Training Site In your internet browser, go to the following IP address: training.nccecas.org/cecas Enter your User Id and Password and click the Log In button
More informationEDGETECH FTP SITE CUSTOMER & VENDOR ACCESS
EDGETECH FTP SITE CUSTOMER & VENDOR ACCESS 1. The EdgeTech FTP site is a web hosted site, not a true FTP site, remember to use http:// not ftp:// in the web address. IMPORTANT: Do Not use FileZilla or
More informationMOVEit Encrypted File Transfer
MOVEit Encrypted File Transfer User Manual August 2014 Contact: Information Security security@siu.edu Table of Contents 1. OVERVIEW... 3 2. ACCESSING MOVEIT... 4 3. INSTALLING THE MOVEIT UPLOAD/DOWNLOAD
More informationGetting Started Guide - Desktop
Getting Started Guide - Desktop 1. Sign Up PERSONAL OPENTEXT CORE ACCOUNT To get started sharing and collaborating on your files from a Mac or Windows browser, you ll need to sign up for your OpenText
More informationWebsense Secure Messaging User Help
Websense Secure Messaging User Help Welcome to Websense Secure Messaging, a tool that provides a secure portal for the transmission and viewing of sensitive, personal data in email. Use the portal to view
More informationMicrosoft OneDrive. How to login to OneDrive:
Microsoft OneDrive The beauty of OneDrive is that it is accessible from anywhere you have an Internet connection. You can access it from a Mac or Windows computer. You can even access it on your Smartphone
More informationTEACHER MESSENGER. August 5, 2014 Student Information Systems
August 5, 2014 Student Information Systems TEACHER MESSENGER Overview: Teacher Messenger is a communication tool from a teacher to a student or guardian. Messenger options include Grades Messenger, Missing
More informationHow to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
More informationHow To Use A Certifiedprofile.Com
Gateway Technical College Step-by-Step Instructions for Order Placement welcome to certifiedprofile! When you place your initial order, you will be prompted to create your secure CertifiedProfile account.
More informationStore, Edit and Share your files in OneDrive for Business on Web. A. Activate OneDrive for Business (Only for First-time Users)
Store, Edit and Share your files in OneDrive for Business on Web A. Activate OneDrive for Business (Only for First-time Users) B. Create a New Document at OneDrive for Business C. Rename a Document at
More informationMake Voice Calls and Share Documents using Skype*
Make Voice Calls and Share Documents using Skype* Intel Easy Steps 1 2012 Intel Corporation Using Skype for making Voice Calls and Sharing Documents In the previous activity Using Skype to Communicate
More informationOutlook Web Access (OWA) with Exchange Server 2007 (Windows version)
Outlook Web Access (OWA) with Exchange Server 2007 (Windows version) 1. Login into your Baylor email account via a web browser such as Internet Explorer, Fire Fox, or Netscape. The web URL is still http://mail.baylor.edu/
More informationOutlook Web Access. PRECEDED by v\
Outlook Web Access Logging in to OWA (Outlook Web Access) from Home 1. Login page http://mail.vernonct.org/exchange 2. To avoid these steps each time you login, you can add the login page to your favorites.
More informationFTP Over SSL (FTPS) Core FTP LE. Installing Core FTP LE"
FTP Over SSL (FTPS) Gordon State College has setup FTP Over SSL (also known as FTPS ) to allow students, faculty, and staff to access resources from our Servers from off-campus using an encrypted connection.
More informationSECURE Email User Guide
SECURE Email User Guide Receiving SECURE Email from Starion Financial Starion Financial is now offering an enhanced email encryption tool, IronPort PXE, which enables the email communication of sensitive
More informationSecure Messaging Service
Human Resources Secure Messaging Service Receiving Secure Emails from West Berkshire Council Table of Contents What are Secure Messaging notifications?... 3 How do I set up my Secure Messaging account?...
More informationHow to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide
How to remotely access your Virtual Desktop from outside the college using VMware View Client How to guide Author: ICT Services Version: 1.0 Date: November 2015 Contents What is the VMware View Client?...
More informationEDE Electronic Data Exchange Instructions April 2007
EDE Electronic Data Exchange Instructions The Minnesota Revenue Department has a web-based data transfer process called EDE Electronic Data Exchange. The address entry point for property-tax-related data
More informationProofpoint provides the capability for external users to send secure/encrypted emails to EBS-RMSCO employees.
Proofpoint provides the capability for external users to send secure/encrypted emails to EBS-RMSCO employees. To create a new email message to be sent securely to an EBS-RMSCO employee: 1. Click on the
More informationCloud Web Portal User Guide Version 2.0
Cloud Web Portal User Guide Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)
More informationSecure Email A Guide for Users
Secure Email A Guide for Users October 14, 2013 10/13 TABLE OF CONTENTS USING THE SYSTEM FOR THE FIRST TIME... 3 EMAIL NOTIFICATION OF SECURE INFORMATION... 3 GETTING REGISTERED ON THE SYSTEM... 4 ACCOUNT
More informationE-mail Encryption. How do I send my e-mail encryption key?
E-mail Encryption SecurenCrypt e-mail encryption was designed to work as a plug-in with Microsoft Outlook. The following instructions are geared toward users encrypting e-mail with Outlook. However, throughout
More informationMikogo Web Conferencing & Remote Support. User Guide (Windows Version)
Mikogo Web Conferencing & Remote Support User Guide (Windows Version) Table of Contents Register an Account... 3 Download the Software... 3 Start a Session... 4 Informing your Participants to Join the
More informationLog-in to the patient booking website
Log-in to the patient booking website From the HealthSpace home page you can select Choose and Book from the menu or by clicking on the Choose and Book image both shown on the left side of the screen.
More informationOnline Academic and Administrative Service System. (GRIPS Gateway) Operation Manual (Student)
Online Academic and Administrative Service System (GRIPS Gateway) Operation Manual (Student) Contents 1. Access from GRIPS homepage... 1 2. Log in to GRIPS Gateway (G-way)... 1 3. If pop-up blocker appears...
More informationD2L STUDENT MANUAL. Prepared by KAMEL SMIDA. Head of E-Learning Unit at the. Applied Medical Sciences College. Majmaah University 5/10/2014
2014 D2L STUDENT MANUAL Prepared by KAMEL SMIDA Head of E-Learning Unit at the Applied Medical Sciences College Majmaah University 5/10/2014 M U u n i v e r s i t y D e a n s h i p O f E - L e a r n i
More informationMSGCU SECURE MESSAGE CENTER
MSGCU SECURE MESSAGE CENTER Welcome to the MSGCU Secure Message Center. Email is convenient, but is it secure? Before reaching the intended recipient, email travels across a variety of public servers and
More informationCONNECT-TO-CHOP USER GUIDE
CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...
More informationProvider Database Consultant Guide
Provider Database Consultant Guide Last updated: 15 March 2013 (r1) Acknowledgment This database software has been developed by the Indonesian Management and Technical Assistance Facility for the Indonesian
More informationSSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems
SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software
More informationAccess and Login. Single Sign On Reference. Signoff
Access and Login To access single sign on, here are the steps: Step 1: type in the URL: postone.onelogin.com Step 2: Enter your Post student email in the username field Step 3: Enter your Post student
More informationSecure Email User Guide Receiving Secure Email from Merchants Bank
Secure Email User Guide Receiving Secure Email from Merchants Bank Contents This document provides a brief, end-user overview of the Cisco Registered Envelope Service Email system which has been implemented
More informationNCH Secure Web Delivery Instructions
NCH Secure Web Delivery Instructions Typically when you send an email to a person, it is sent in Clear Text and can be viewed as it traverses the internet. Email is typically not considered a good vehicle
More informationOffice365 at Triton College
Office365 at Triton College Logging in to Office365 The new log in page for Triton email is http://outlook.com/triton.edu At that page, enter your username in this format: firstnamelastname@triton.edu
More informationOneSourceFax Customer Guide
OneSourceFax Customer Guide General Information Billing: OneSourceFax Plan Features Monthly Charge OneSourceFax 150 Unlimited Faxes to Numbers in your Local Calling Area $12.95 150 Nationwide Long Distance
More informationNovo Nordisk Secure File Transfer User Guide
hehe Novo Nordisk Secure File Transfer User Guide Table of Contents 1. Purpose of this document... 2 2. Getting Access... 2 3. Installing the Upload/Download Wizard (first time only)... 2 4. Uploading
More informationTechnology @ QMU. QuickStartIT: QMU OWA (webmail) service
Technology @ QMU QuickStartIT: QMU OWA (webmail) service v1.1, September 2013 What s in this guide? Page Introduction to the QMU OWA (webmail) service 2 Logging in to the QMU OWA (webmail) service 2 OWA
More informationInstall MSU Google Drive on your Computer
416 Agriculture Hall Michigan State University 517-355-3776 http://support.anr.msu.edu support@anr.msu.edu Install MSU Google Drive on your Computer Document # - 168 Creation/Revision Date 4/2013 Revision
More informationHow to Create a New User Account for MyGovernmentOnline
How to Create a New User Account for MyGovernmentOnline *Prior to getting started, we encourage you to download and install the web browser Mozilla Firefox. While the MyGovernmentOnline software is designed
More informationMariemont City Schools
Mariemont City Schools Citrix Virtual Desktop Environment Citrix is a virtual desktop system that allows users to access their Mariemont Windows 7 desktop from anywhere with an Internet connection. Once
More informationSJRWMD Cloud-Based Email Quick-Start Guide
SJRWMD Cloud-Based Email Quick-Start Guide Your email account is now in the Microsoft cloud, also known as Office 365. This change from onpremise email provisioning to the cloud allows the agency to provide
More informationInstructions for Secure Email Cisco Registered Envelope Service (CRES)
Instructions for Secure Email Cisco Registered Envelope Service (CRES) Please read the official Cisco Guidance on the Cisco Registered Envelope Service And Frequently Asked Questions A courtesy attempt
More informationUsing the Help Desk. Logging into Help Desk. Creating a New Help Desk Ticket
powered by Logging into Help Desk 1. Go to http://helpdesk.hslc.org. 2. Login using your username and password. 3. Are you creating a new Help Desk ticket? If yes, see Creating a New Help Desk Ticket.
More informationFigure 1. Deskguide Tumbleweed External User Instructions Page 1 of 5
This document provides instructions for communicating with the (DSS) through secure email, also known as Tumbleweed. It will tell you how to: 1. Know that you have received a secure email and how to access
More information