Secure file transmission of PHI, RHI and sensitive information
|
|
- Anastasia Higgins
- 8 years ago
- Views:
Transcription
1 File Transfer Application (FTA) Secure file transmission of PHI, RHI and sensitive information
2 Background Overview File Transfer Application (FTA) Web Application i Use Outlook Plug In Use 2
3 Background Information Privacy & Security Executive Committee VUMC, through its IPSEC Regularly assesses the operating and computing environment Identifies risk factors Defines safeguards against intentional or unintentional disclosure of Protected Health Information (PHI), Research Health Information (RHI), person-identifiable, or other confidential or proprietary p information created, used, or maintained by Vanderbilt. 3
4 Background (Cont) Electronic Messages Containing Sensitive Information Electronic messages (e.g. , text messaging, g, or instant messaging) g) may contain information that is regarded as sensitive by either the sender or receiver Individually identifiable Sensitive Information is not to be transmitted by Vanderbilt Workforce Members over electronic communication systems without taking appropriate measures to safeguard the security of the information against message interception, content alteration, or unauthorized disclosure. The File Transfer Application is a tool workforce members can use with to transfer files of information securely 4
5 Before You Begin What is the File Transfer Application (FTA) and when should it be used? FTA is an application allowing a user to securely transfer a file from one user to another. It is the File that t is secured, rather than the text t of the . The FTA should be used for transferring confidential or sensitive information as indicated in the policy but not for general file attachment use. 5
6 Before You Begin What is the File Transfer Application (FTA) and when should it be used? The FTA is a companion process to support compliance of the Electronic Messaging of Individual Identifiable Patient and Other Sensitive Information policy OP to assist in secure file transfer. According to the policy - Use of secure messaging via the StarPanel message basket system is the preferred mode of electronic messaging among and between VUMC clinical staff and faculty about a specific patient. MHAV is the preferred mode of electronic messaging between a patient and a provider 6
7 New Web Solution Who will use the FTA? There are two classifications of users: (Internal & External) Internal: 1. The Web Application user - a user whose position requires transfer of secure files internally or externally, less than 10 times per month. 2. The Outlook Plug-in Key Function User - a user whose position requires multiple occurrences of secure file transfers in excess of 10 times per month. External: User will be Web Application User by receiving an from an internal user only. 7
8 New Web Solution How do I begin using the Web version of FTA? For Vanderbilt Users an account already exists and logging in will activate your account Your User ID is user s Vanderbilt Address firstname.lastname@vanderbilt.edu The address is utilized because it is easily recognizable. Your Password is your epassword (the one that is normally used with the users VUnetID) 8
9 Web Application For Vanderbilt Users The follow are the instructions on how to use secure file transfer with the web application. If you experience ANY difficulties, please contact the VUMC Help Desk at 3-HELP (3-4357) and have them open a ticket for Network Security Click on this link to navigate to the website It is recommended that the user bookmark the link for future reference. 9
10 10
11 11
12 12
13 13
14 14
15 15
16 16
17 New Web Solution When I am finished i sending files from the Web Application, how do I know I have closed my connection to the FTA? The user needs to make sure they have completely closed dtheir Web bb Browser (i.e. close all Internet t Explorer - pages, windows, tabs) This is applicable also if you are the receiver er and going to the web to retrieve file(s) 17
18 New Web Solution What is the experience for the receiving i person? The Internal user (VU/VUMC) will click on the link to the file in their and sign in with their address and VUnet epassword The External user will receive an form a Vanderbilt Workforce Member and be required to set up an account for the Web Application 18
19 New Outlook Solution My work processes require use of the FTA plug-in for Outlook. How do I obtain this? Use of the FTA Plug-In requires installation ti on the user s workstation and will require assistance from user s LAN manager or Technical Support Provider. One should contact the Helpdesk and request a ticket be sent to Network Security to request an invitation to install the FTA Plug-In. The user will receive an from Network Security with pertinent information. Once the user has received the , he or she will contact their LAN or Technical Support Provider to install the necessary software. 19
20 Outlook Plug-In Use After installation, when New Message is opened, there will be an icon for the Accellion Secure File Transfer 20
21 Outlook Plug-In Use Enter the To, CC, Subject and Body of (body not secured). Click on Accellion Icon, Attach File. Below is how it will appear before you hit Send Notice the Accellion Icon symbol on the attachment. This is verification that it is a secured file attachment 21
22 Send Outlook Plug-In Use Creates Accellion Outbox in your Outlook folders list- it may take about 30 seconds for to clear Accellion Outbox and be sent 22
23 Outlook Plug-In Use Go to Sent Items and open message. It will appear like this: 23
24 Outlook Plug-In Use SENDING WITH BOTH A REGULAR ATTACHMENT AND A SECURE ATTACHMENT If there is need to send a regular (unsecured) attachment and a secured attachment Use the paper clip icon for the unsecured attachment Use the Accellion icon for the secured attachment 24
25 Outlook Plug-In Use Go to Sent Items and open message. It will appear like this 25
26 More Specific Information About The FTA What is the Maximum File Attachment size in the Web Application? There is no Maximum file size for the Web Application. 26
27 More Specific Information About The FTA How long does the Web Application retain files and messages? The files and messages sent from the Web Application are currently retained for 30 days. 7 days for files over 2GB. How long are Web Application Accounts Retained? Internal accounts are set to expire after 120 days of inactivity. External accounts are set to expire after 45 days of inactivity 27
28 Information Privacy & Security Wbit Website 28
Secure file transmission of PHI, RHI and sensitive information
Secure file transmission of PHI, RHI and sensitive information Background File Transfer Application (FTA) Web Application Use Outlook Plug In Use Workspace Use 2 Information Privacy & Security Executive
More informationONE Mail Direct for Desktop Software
ONE Mail Direct for Desktop Software Version: 1 Document ID: 3931 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2015, ehealth Ontario All rights reserved No part of this document may
More informationSecure E-Mail Management Guide. June 2008
Secure E-Mail Management Guide June 2008 What are Paychex Secure Messages? To enhance the security of client and vendor data, Paychex created the Paychex Secure E-mail Message Center, a Web site hosted
More informationSecureSend File Transfer Portal Usage Guide
System Documentation 03/01/2012 SecureSend File Transfer Portal Usage Guide Recommended Usage Instructions and Frequently Asked Questions Jose Ruano, Stephen Weatherly TABLE OF CONTENTS EXECUTIVE SUMMARY...3
More informationNew Uses for ROCKET: HIPAA Compliant Workspaces and Other Developments. Tara Helmer Research Services Consultant July 12, 2013
New Uses for ROCKET: HIPAA Compliant Workspaces and Other Developments Tara Helmer Research Services Consultant July 12, 2013 What is ROCKET(Research, Organization, and Collaboration Knowledge Exchange
More informationBusiness Procedures: Send Secure Emails Created: 02-25-2014 Updated: 04-15-2014
Business Procedures: Send Secure Emails Created: 02-25-2014 Updated: 04-15-2014 Page 1 of 10 Overview From time to time it is necessary to be able to share confidential information with school districts
More informationCryptshare for Outlook User Guide
Cryptshare for Outlook User Guide V1.6.2 Befine Solutions AG Werthmannstr. 15 79098 Freiburg i. Br. Germany Web: https://www.cryptshare.com E-Mail: info@cryptshare.com Tel.: +49 761 389 13 0 Fax: +49 761
More informationHow to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
More informationFDIC Secure Email Procedures for External Users April 23, 2010
FDIC Secure Email Procedures for External Users April 23, 2010 This document contains information proprietary to the Federal Deposit Insurance Corporation. Table of Contents 1. Introduction...2 2. Receiving
More informationUsing Entrust certificates with Microsoft Office and Windows
Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
More informationVCW FTP Microsoft Outlook Add-In Configuration and Implementation
VCW FTP Microsoft Outlook Add-In Configuration and Implementation After installation of the Microsoft Outlook Plug-In; the WS_FTP icon in the system tray needs to be configured with the following parameters
More informationBackground Information
User Guide 1 Background Information ********************************Disclaimer******************************************** This is a government system intended for official use only. Using this system
More informationUsing Outlook Web Access (OWA)
Using Outlook Web Access (OWA) 1. Logon and Logoff instructions 2. OWA components 3. Working with Message Creating a Message Reply to or forward a Message 4. Working with Attachments Attaching a file to
More informationVanderbilt University
Vanderbilt University Performance Evaluation System Self Evaluation Guide Provided by Vanderbilt Human Resources Table of Contents VPES Overview... 3 Self Evaluations Overview... 3 Need Help?... 3 Getting
More informationResearch and the HIPAA Security Rule Prepared for the Association of American Medical Colleges by Daniel Masys, M.D. Professor and Chairman,
Research and the HIPAA Security Rule Prepared for the Association of American Medical Colleges by Daniel Masys, M.D. Professor and Chairman, Department of Biomedical Informatics Vanderbilt University School
More informationWelcome to HomeTown Bank s Secure E-mail! User Guide
Welcome to HomeTown Bank s Secure E-mail! User Guide To access the secure email message center, click the Secure Email link on the www.htbmn.com main web page. Select whether you are a new user of the
More informationEntering a Case Into the PeopleSoft Helpdesk (CRM) Logging in
Entering a Case Into the PeopleSoft Helpdesk (CRM) Logging in Open Internet Explorer Logging in Navigate to the district home page: http://www.fortbend.k12.tx.us/ Click on Employee Services Finally, click
More informationPOLICIES & PROCEDURES
Series Title POLICIES & PROCEDURES PRIVACY & SECURITY EMAIL & PHI Policy Date 05/2013 Procedure Date: 11/2013 TABLE OF CONTENTS A. Risk Assessment & Committee Responsibilities... 1 B. How to Send Encrypted
More informationHealthcare Compliance Solutions
Healthcare Compliance Solutions Let Protected Trust be your Safe Harbor In the Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH), the U.S. Department of Health and Human
More informationCloud Web Portal User Guide Version 2.0
Cloud Web Portal User Guide Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)
More informationSecure File Transfer Guest User Guide Updated: 5/8/14
Secure File Transfer Guest User Guide Updated: 5/8/14 TABLE OF CONTENTS INTRODUCTION... 3 ACCESS SECURE FILE TRANSFER TOOL... 3 REGISTRATION... 4 SELF REGISTERING... 4 REGISTER VIA AN INVITATION SENT BY
More informationUsing Barracuda Spam Firewall
Using Barracuda Spam Firewall Creating your Barracuda account Your Barracuda account has been created for you if you are a current Hartwick College student, staff or faculty member. Setting Your Password.
More informationGuide to Using Citrix at SLU (Windows)
1 Guide to Using Citrix at SLU (Windows) Section 1: Installing Citrix Client on Your Computer Page 2 Section 2: Citrix Homepage Page 9 Section 3: Troubleshooting Page 11 Section 4: Opening and Saving Files
More informationHow to Use Boston Private Bank s Secure Mail Service
1. ONE-TIME REGISTRATION PROCESS Prior to using the Secure Mail service for the first time, a user must initially register with the service by completing steps A thru E below: A. When a Secure Mail encrypted
More informationUsing YSU Password Self-Service
Using YSU Password Self-Service Using YSU Password Self-Service Password Self-Service Web Interface Required Items: YSU (MyYSU) Directory account, Web browser This guide will assist you with using the
More informationHIPAA Information Security Overview
HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is
More informationU.S. Bank Secure Mail
U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email
More informationSecure Mail Registration and Viewing Procedures
Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email
More informationThe End User Experience. Introduction to Archiving for End Users
The End User Experience Introduction to Archiving for End Users Revision: 1 Last Revised: 14 March 2013 Copyright This documentation and software described herein is copyrighted. Under copyright laws,
More informationD&B SafeTransPort Tutorial YOUR MANAGED FILE TRANSFER SOLUTION FOR SECURE FILE TRANSFERS WITH D&B
Tutorial YOUR MANAGED FILE TRANSFER SOLUTION FOR SECURE FILE TRANSFERS WITH D&B Overview Overview Topics Covered overview, features and benefits Account activation and password maintenance Using the User
More informationSecure Email Client Guide
PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing
More informationIntroduction to ilab Solutions for Core Directors and Staff
Introduction to ilab Solutions for Core Directors and Staff Table of Contents Account Access & Login Credentials... 2 Account Registration for First-time Users... 2 Accessing Vanderbilt Cores... 3 Center
More informationwvoasis Vendor Self Service Registration Quick Start Guide Release 3.9.0.1
wvoasis Vendor Self Service Registration Quick Start Guide Release 3.9.0.1 December 3, 2014 Revision 1 Copyright 2001, 2013 CGI Technologies and Solutions Inc. All rights reserved. These materials contain
More information1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6
MailTrack How To Document 27 March 2014 Table of Contents 1. How to Register... 2 2. Forgot Password... 4 3. Login to MailTrack Webmail... 5 4. Accessing MailTrack message Centre... 6 5. Creating a MailTrack
More informationHealthcare Compliance Solutions
Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and
More information8.03 Health Insurance Portability and Accountability Act (HIPAA)
Human Resource/Miscellaneous Page 1 of 5 8.03 Health Insurance Portability and Accountability Act (HIPAA) Policy: It is the policy of Licking/Knox Goodwill Industries, Inc., to maintain the privacy of
More informationWakefield Council Secure email and file transfer User guide for customers, partners and agencies
Wakefield Council Secure email and file transfer User guide for customers, partners and agencies The nature of the work the council carries out means that we often deal with information that is sensitive
More informationUser Guide. IntraLinks Courier Plug-in for Microsoft Outlook
IntraLinks Courier Plug-in for Microsoft Outlook User Guide Copyright 2012 IntraLinks, Inc. Version 3.2 September 2012 IntraLinks 24/7/365 support US: 212 543 7800 UK: +44 (0) 20 7623 8500 See IntraLinks
More informationAccellion, Inc. 1900 Embarcadero Road Suite 207 Palo Alto, CA 94303 Tel +1 650 739-0095 Fax +1 650 739-0561. info@accellion.com
Accellion, Inc. 1900 Embarcadero Road Suite 207 Palo Alto, CA 94303 Tel +1 650 739-0095 Fax +1 650 739-0561 info@accellion.com TABLE OF CONTENTS QUICK START... 4 Create an Account... 4 Send a file... 4
More informationS-Doc User Guide. Instructions on using the Secure Document Online Courier with the CAAT Pension Plan. September 2012
S-Doc User Guide Instructions on using the Secure Document Online Courier with the CAAT Pension Plan Secure solution provided by Accellion September 2012 S E C U R E C O L L A B O R A T I O N U S E R G
More informationSecure Email Client User Guide Receiving Secure Email from Mercantile Bank
Receiving Secure Email from Contents This document provides a brief, end-user overview of the Secure Email system which has been implemented by. Why Secure Email? When someone sends you an email, the email
More informationCitrus Valley Health Partners. Web Outlook User Guide. Table of Contents
Citrus Valley Health Partners Web Outlook User Guide Table of Contents Getting Started Page Access to Web Outlook... 1 Log in Instructions... 1 Basic Navigation... 1 The Menu Bar... 1 The Reading Pane...
More informationCDUfiles User Guide. Chapter 1: Accessing your data with CDUfiles. Sign In. CDUfiles User Guide Page 1. Here are the first steps to using CDUfiles.
CDUfiles User Guide Chapter 1: Accessing your data with CDUfiles Here are the first steps to using CDUfiles. Sign In Open your web browser and enter cdufiles.cdu.edu.au or Note: Use cdufiles.egnyte.com
More informationSecuremail User Guide
Securemail User Guide Created: 2009-02-17 Updated: 2013-07-05 - New links and Address Book instructions Updated: 2014-04-23 - http://dhhs.ne.gov/documents/dhhs-securemail-userguide.pdf 1 INDEX: How Securemail
More informationSEC External Guide for Using Accellion
Securities and Exchange Commission Office of Information Technology SEC External Guide for Using Accellion The Securities and Exchange Commission National Exam Program Hotline (202) 551-3925 Washington,
More informationOutlook Web Access -User Guides-
Nilai University College (Nilai Education Sdn. Bhd) Outlook Web Access -User Guides- Prepared By IT Department (Infrastructure Team) VERSION: 1.0 All rights reserved. This document is a proprietary product
More informationEmployee Quick Reference Guide
Employee Quick Reference Guide Thank you for using ADP's ipaystatements to view your payroll information. Use this Quick Reference Guide to learn how to view your pay statements, W-2s, 1099s, and adjustments.
More informationRemedy ITSM Service Request Management Quick Start Guide
Remedy ITSM Service Request Management Quick Start Guide Table of Contents 1.0 Getting Started With Remedy s Service Request Management. 3 2.0 Submitting a Service Request.7 3.0 Updating a Service Request
More informationHealth Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
More informationQuick Start : i-fax User Guide
Quick Start : i-fax User Guide Introduction Welcome to the i-fax System User Guide! This manual will help new users navigate i-fax System and perform common tasks. This manual is task-oriented. You will
More informationVanderbilt University
Vanderbilt University Performance Evaluation System Supervisor s Guide Provided by Vanderbilt Human Resources Table of Contents Overview... 3 VPES Evaluation Types... 3 VPES User Types... 4 Need Help?...
More informationWHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE
WHAT IS VIRTUAL DESKTOP? Virtual Desktop is an online environment that allows you to access NSF applications and a virtual desktop that mimics a Windows 7 environment. You can use Virtual Desktop to use
More informationSECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011
SECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011 Introduction In October, 2008, the Division of Welfare and Supportive Services (DWSS) announced the introduction of secure e-mail through ASM 17-08.
More informationProvider Express Obtaining Login Access. Information for Network Providers
Provider Express Obtaining Login Access Information for Network Providers November 2013 Objectives This presentation will review the following features: How to Log in to Provider Express Retrieve a forgotten
More informationIT Handbook. Contents
IT Handbook The IT team has provided some resources for you to help you in your job. Please use these tools to help our department help you with any issues that you may be having with your computer. Some
More informationFax and SMS Quickguide
INTRODUCTION U2 Fax and SMS allow faxes and SMS to be sent directly from a user s workstation via the Internet using U2 Webservices. This improves staff efficiency by removing the need to physically fax
More informationEASTPOINTE SECURE E MAIL SYSTEM SETUP INSTRUCTIONS
EASTPOINTE SECURE E MAIL SYSTEM SETUP INSTRUCTIONS In order to send and receive protected health information (PHI) on consumers between Eastpointe and your provider agency you will need to do the following.
More informationTechnical Support System
Technical Support System USER S GUIDE 1 Table of Contents 1.0 GENERAL INFORMATION..3 1.1 System Overview...........4 1.1.1 Objectives...........4 1.1.2 Process Flow..............4 1.1.3 Users...........4
More informationStore, Edit and Share your files in OneDrive for Business on Web. A. Activate OneDrive for Business (Only for First-time Users)
Store, Edit and Share your files in OneDrive for Business on Web A. Activate OneDrive for Business (Only for First-time Users) B. Create a New Document at OneDrive for Business C. Rename a Document at
More informationeprofile: View/Modify Home and Mailing Address Important Tips to Remember when working in My Akron
eprofile: View/Modify Home and Mailing Address This document provides an overview of updating your home and mailing address using the self-service function available via My Akron, s portal. This self-service
More informationNetwork Edition Download / Installation Instructions
Network Edition Download / Installation Instructions This document includes download/installation instructions for installing PlanGuru v6 on a network server. To facilitate this process, we recommend that
More informationHeather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually
More informationThose who wish to remotely log on to a Pepperdine Windows desktop computer will also need to have these instructions with them when they connect.
Using Microsoft s Remote Desktop Connection (RDC) program, Pepperdine faculty and staff who use Macintosh and Windows computers can log on to Pepperdine s Remote Access Server (remoteaccess.pepperdine.edu)
More informationHIPAA ephi Security Guidance for Researchers
What is ephi? ephi stands for Electronic Protected Health Information (PHI). It is any PHI that is stored, accessed, transmitted or received electronically. 1 PHI under HIPAA means any information that
More informationSecure File and E-mail Delivery Application (SFED)
Commonwealth of Massachusetts Information Technology Division Secure File and E-mail Delivery Application (SFED) Web Interface Demonstration v1.0-10/27/2005 Page 1 TABLE OF CONTENTS: Introduction 3 Key
More informationHow to: Use Outlook Web App (OWA)
How to: Use Outlook Web App (OWA) Southern State Community College I.T. Department Phone: 1.800.628.7722 ext. 2800 E-Mail: Support@sscc.edu Southern State Community College White Paper How to: Use Outlook
More informationWatchDox for Windows. User Guide. Version 3.9.5
WatchDox for Windows User Guide Version 3.9.5 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to
More informationAir Resources Board File Transfer Protocol (FTP)
Air Resources Board File Transfer Protocol (FTP) A Handbook for External Users (those not connected to the ARB network) July 2006 How do I use ARB FTP? What is the FTP server and who can use it? What software
More informationPennsylvania Department of Public Welfare. Bureau of Information Systems OBSOLETE. Secure E-Mail User Guide. Version 1.0.
Pennsylvania Department of Public Welfare Bureau of Information Systems Secure E-Mail User Guide Version 1.0 August 30, 2006 Table of Contents Introduction... 3 Purpose... 3 Terms of Use Applicable to
More informationHow to use Mints@Home
How to use Mints@Home Citrix Remote Access gives Mints users the ability to access University Of Cambridge and MINTS resources from any computer, anywhere in the world,. The service requires a high-speed
More informationOnline Statements. About this guide. Important information
Online Statements About this guide This guide shows you how to: View online statements, including CommBiz Activity Statements (Billing summaries) and online statements for Transaction Accounts, Credit
More information... This page intentionally left blank... Print in duplex mode (front and back) to avoid printing this page on separate sheet.
August - 2003 This guide is available at http://blue.usps.gov/hrisp/hris/guidebks/welcome.htm and is designed for printing in duplex mode (front and back). ... This page intentionally left blank... Print
More informationAbila Grant Management. Document Management
Abila Grant Management This is a publication of Abila, Inc. Version 2014 2014 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names
More informationWelcome. 4 Common Security Best Practices. to the. Online Training Course
Welcome to the 4 Common Security Best Practices Online Training Course Disclaimer 2 Introduction Information Security means protecting information from unauthorized access, use, disclosure, inspection
More informationSecure Email User Guide. PGP (Pretty Good Privacy)
Secure Email User Guide PGP (Pretty Good Privacy) 1 Contents 1 Introduction... 3 2 PGP Web Messenger... 4 3 Enrolling as a PGP Web Messenger User... 4 4 How to use PGP Web Messenger... 6 4.1 Mailbox access...
More informationHenrico County Public Schools
Henrico County Public Schools Presents: The New Web Based E-Mail Solution DRAFT Table of Contents Table of Contents...2 Logging Into Outlook Web Access...4 Overview..5 Navigating the Outlook Components...5
More informationDigiDelivery Client Quick Start
DigiDelivery Client Quick Start Installing the DigiDelivery Client To download and install the DigiDelivery client software: 1 Launch your Web browser and navigate to www.digidesign.com/digidelivery/clients.
More informationFrequently Asked Questions The next section includes FAQs to help you to access and use your student email account.
Factsheet 22 Student Email September 2011 This factsheet can be made available in alternative formats. Please make your request at the Library Help Desk, telephone 01642 342100 or email libraryhelp@tees.ac.uk
More informationecfshome-ts Terminal Server How to Use
ecfshome-ts Terminal Server How to Use Connect to VPN Connect to Terminal Server, Set Options to Use Personal Computer Files, Printers, Clipboard Use Network Folders Copy Files from Network Folders to
More informationUsing the BWSD Help Desk Website
Accessing the Help Desk Website Using the BWSD Help Desk Website Open your web browser and go to http://helpdesk.bwschools.net:8080/ The Help Desk login screen will be displayed. 1. You should not have
More informationOUTLOOK WEB ACCESS 2007 PREMIUM
OUTLOOK WEB ACCESS 2007 PREMIUM United Nations Development Programme / PAPP Information & Communications Technology Office Intro to Outlook Web Access 2007... 2 Searching... 5 Creating a new E mail Message...
More informationUC Irvine Health Secure Mail Message Center
UC Irvine Health Secure Mail Message Center UC Irvine Health is committed to protecting the privacy of its member s information, especially their protected health information (PHI). UC Irvine Health is
More informationSoftware Support Registration
Software Support Registration Purpose This document is to show the multiple workflows for registering for online access to the Software Support site for Schlumberger. Contents Software Support Registration...
More informationWatchDox for Windows User Guide. Version 3.9.0
Version 3.9.0 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals or
More informationEnter your User Id and Password and click the Log In button to launch the application.
Working with CECAS How to Log In to CECAS Training Site In your internet browser, go to the following IP address: training.nccecas.org/cecas Enter your User Id and Password and click the Log In button
More informationUsing Outlook Web App
Using Outlook Web App About Outlook Web App Using a web browser and the Internet, Outlook Web App (OWA) provides access to your Exchange mailbox from anywhere in the world at any time. Outlook Web App
More informationMSI Secure Mail Tutorial. Table of Contents
Posted 1/12/12 Table of Contents 1 - INTRODUCTION... 1-1 INTRODUCTION... 1-1 Summary... 1-1 Why Secure Mail?... 1-1 Which Emails Must Be Encrypted?... 1-2 Receiving Email from MSI... 1-2 Sending Email
More informationMiraCosta College now offers two ways to access your student virtual desktop.
MiraCosta College now offers two ways to access your student virtual desktop. We now feature the new VMware Horizon View HTML access option available from https://view.miracosta.edu. MiraCosta recommends
More informationCitrix Remote Access Portal U s e r M a n u a l
Citrix Remote Access Portal U s e r M a n u a l 1 P a g e Table of Contents Table of Contents... 2 Introduction... 3 1. What is Citrix and how does it work?... 4 2. PC Setup/Internet Explorer - Connecting
More informationHow To Access The Outlook Help Desk In Outlook.Com
To Access the Imagine! Help Desk please open your web browser to: http://helpdesk.imaginecolorado.org/ Press Ctrl + Click to open this link from this document. The first thing you will see is a login screen.
More informationOutlook Web App McKinney ISD 5/27/2011
Outlook Web App McKinney ISD 5/27/2011 Outlook Web App Tutorial Outlook Web Access allows you to gain access to your messages, calendars, contacts, tasks and public folders from any computer with internet
More informationMontefiore Portal Quick Reference Guide
Montefiore Portal Quick Reference Guide Montefiore s remote portal allows users to securely access Windows applications, file shares, internal web applications, and more. To use the Portal, you must already
More informationReporting Relationship Self Service Guide
Reporting Relationship Self Service Guide Reporting Relationship Self Service through My Sac State enables university employees (faculty and staff) to view the name, department and position title for the
More informationGuidelines for using e-mail account through OWA
Guidelines for using e-mail account through OWA Logon to Outlook Web Access (OWA), UNITEN User E-mail. UNITEN User E-mail account is accessible through out the world. It is also known as OWA (Outlook Web
More informationINET1005 May 2009 Getting Started with MyUH Email
INET1005 May 2009 Getting Started with MyUH Email Introduction Introduction... 1 Overview... 1 My E-mail Inbox Channel... 2 MyUH E-mail Center... 3 Address Book... 5 Email Options... 6 Help... 6 Exit...
More informationFile Storage. This is a manual that contains pertinent information about your File Storage space at SLC.
File Storage This is a manual that contains pertinent information about your File Storage space at SLC. About All students at SLC are provided with an allotment of secure storage space to save and store
More informationHIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
More informationOutlook E-Mail. Step 1: Open and Configure Outlook
Outlook E-Mail Step 1: Open and Configure Outlook 1. Click the Microsoft Button in the lower left task bar 2. Select All Programs 3. Select Microsoft Office 4. Select Microsoft Outlook 5. Follow the Start
More informationSELF HELP PROCEDURE. October, 2010. Updated January, 2011
Rehab - Self Help Procedure Cheat Sheet December, 2010 1. Disconnected VDI session: Re-launch VDI within 5 minutes of disconnection to reopen the MediLinks session and recover your data. If you wait longer
More informationEJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8
EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8 External Users Decrypting Secure Messages The following sections describe how users external to EJGH receive and decrypt secure messages. Reading
More information