ACS Encryption Recipient Guide
|
|
- Barbara Wilson
- 8 years ago
- Views:
Transcription
1 ACS Encryption Recipient Guide
2 ACS ENCRYPTION SERVICES / TRAINING AND AWARENESS ACS Encryption Recipient Guide Encryption Recipient Guide ACS A Xerox Company 2828 North Haskell Dallas, TX For Support Call Encryption Recipient Guide v2.1 1 ACS, A Xerox Company
3 Table of Contents INTRODUCTION... 3 OPENING AND READING AN ENCRYPTED SENDING AN ENCRYPTED TO ACS... 9 MANAGING ENCRYPTED MESSAGES Encryption Recipient Guide v2.1 2 ACS, A Xerox Company
4 Introduction Establishing secure lines of communication is a top priority at ACS. Every day we handle a multitude of sensitive and confidential information on behalf of our clients and employees. It is vital that we properly secure information that travels through our servers. The protection of Personal Information is critical to maintain our reputation and achieve our goals at ACS. Protecting information that has been entrusted to us is crucial to ACS business because data management is the core of so many of the services we offer. In addition to legal requirements, our customer contracts require that we use, handle, and store Personal Information in accordance with specific standards, which can differ widely from customer to customer with monetary, legal, and other penalties for failure to do so. As part of our work to continually provide world-class service and to assure our clients and employees that their Personal Information is safe, ACS Information Systems Security Services and ACS Messaging have worked together to provide encryption services to our clients and employees. Information that Requires Encryption ACS manages highly sensitive information for our employees, clients, and our clients customers and constituents. This information is known as Personal Information. [PI] Personal Information defined, is information in any form (written, oral or electronic) that could be used alone or in combination with other information to identify an individual. Some information, such as a Social Security Number, can be used alone to identify an individual, and is therefore considered Personal Information. Other types of information, such as a zip code, must be combined with other data to identify an individual in order to be considered Personal Information. There are a variety of types of data that, alone or in combination with other information, can be used to create Personal Information. These include, but are not limited to: An individual s name, address, zip code, address, telephone and fax numbers All dates related to an individual (e.g., birth date, admission date) Health-related information of any kind, including providers, treatment, insurance coverage, and payment information Account or card numbers identifying a specific individual's account, including medical, health care, and financial accounts Tax ID and Social Security Number, driver s license and license plate numbers, photograph, or biometric identifier User IDs, passwords, and logins Employment and education records Compensation and benefits information Financial Information for both ACS and our clients: this includes internal accounting and financial reporting data, credit card numbers, bank account information, mortgage information, client finance and accounting information, etc. Encryption Recipient Guide v2.1 3 ACS, A Xerox Company
5 Opening and Reading an Encrypted 1. Open your message entitled ACS Secured Message. 2. Click on the link provided to read the message. ACS Secured Message From: Add contact Sent: Fri 2/01/08 1:26 PM To: You have received an ACS Secured Message from: Employee, ACS To read this message securely, please click this link: CONFIDENTIALITY NOTICE: This message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply and destroy all copies of the original message. 3. If you are a first time user, you will be prompted to create a passphrase. This allows access to a secure Inbox where you can read the decrypted s. Click on Continue to proceed. Encryption Recipient Guide v2.1 4 ACS, A Xerox Company
6 Opening and Reading an Encrypted (continued) On the Message Delivery Options page, you will be prompted to select the way you want to receive future s from ACS. At the present time the PGP Web Messenger is the only option and is already selected for you. (This is for screen is for first time users only.) 4. Click the Choose Option button. NOTE: It is recommended that you check the box labeled: Save a copy of all outgoing messages in my Sent Mail folder. Encryption Recipient Guide v2.1 5 ACS, A Xerox Company
7 Opening and Reading an Encrypted (continued) Please Note the Following with Regards to Login: If you have already set up your account you will only be asked to enter your passphrase. If you have previously logged in and forgot you passphrase you will receive the following screen; or if you log into Web Messenger directly (log out and log back in) you will also receive the following screen. If you receive this screen Type your Address and Passphrase on the PGP Web Messenger login page. 5. Click the Login button. Encryption Recipient Guide v2.1 6 ACS, A Xerox Company
8 Opening and Reading an Encrypted (continued) You are directed to your personalized Secure Inbox as shown below. If there are multiple messages, the PGP Universal server displays all messages. 6. Click on the desired message from the list. Once a message is open, you can use the tool bar to Reply, Reply to All, and Download Attachments or Delete. Note: Recipients can reply back to a secured as long as: 1. The reply is sent to those listed as recipients on the The reply is sent to an address that is part of a managed domain (currently the managed domain consists of addresses containing asc-inc.com, acs-hro.com and buckconsultants.com) Encryption Recipient Guide v2.1 7 ACS, A Xerox Company
9 Opening and Reading an Encrypted (continued) 7. Click the Logout button, once you have completed your tasks. If the recipient attempts to send an to someone who is not already carbon-copied on the or is not part of the managed domain, the following error message will appear: Note: Please be aware that attachments do not appear with the paperclip icon as they do in Outlook. Recipients of encrypted must scroll down to the end of the message to confirm that an attachment has been included with the . Encryption Recipient Guide v2.1 8 ACS, A Xerox Company
10 Sending an Encrypted to ACS You can send a secure to ACS using Web Messenger. With this procedure, s originating from the Client or Vendor site may only be sent to persons with managed ACS domains listed on the PGP server. This typically includes s sent to recipients with the following domain addresses as well as some others: acs-inc.com acs-hro.com buckconsultants.com To compose an encrypted message: 1. Click the Compose button from the Inbox screen. Complete the fields as normal. 2. Click the Send button. Note: DO NOT SEND s to a distribution list. The PGP server is not designed to send encrypted messages to distribution lists. The name(s) of each recipient must be entered individually. Note: Your session will time-out after 15 minutes of inactivity. You will have to log in again and compose your entire . Encryption Recipient Guide v2.1 9 ACS, A Xerox Company
11 Managing Encrypted Messages Users of encryption who have their system set up to automatically save outgoing messages in the Sent folder can review and manage these messages by selecting the Sent button from any screen. When this is done, the following screen will appear: By selecting the desired sent message, you can display it for review and/or deletion. Remember the amount of memory allocated for messages is not very large, so please keep the number of messages saved in the Inbox and Sent box to a minimum. Encryption Recipient Guide v ACS, A Xerox Company
Xerox Email Encryption Recipient Guide. Cisco Registered Envelope Service
Xerox Email Encryption Recipient Guide Cisco Registered Envelope Service 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United States
More informationHoneywell Secure Email External User Guide August 2013
Honeywell Secure Email External User Guide August 2013 PAGE: 1 of 14 Chapter No Table of Content Page No 1 Introduction 3 2 Using the Honeywell Secure Email Interface 3 3 Sending an Encrypted Email to
More informationSecure E-Mail Management Guide. June 2008
Secure E-Mail Management Guide June 2008 What are Paychex Secure Messages? To enhance the security of client and vendor data, Paychex created the Paychex Secure E-mail Message Center, a Web site hosted
More informationEJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8
EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8 External Users Decrypting Secure Messages The following sections describe how users external to EJGH receive and decrypt secure messages. Reading
More informationBackground Information
User Guide 1 Background Information ********************************Disclaimer******************************************** This is a government system intended for official use only. Using this system
More informationCan I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.
How does Secure E-mail work? When an e-mail is initiated or responded to the secure e-mail algorithm will determine if the e-mail needs to be encrypted based on predefined criteria. If it meets the predefined
More informationCISCO SECURE MAIL. External User Guide. 1/15/15 Samson V.
1/15/15 Samson V. 1. These instructions are for users who reside outside the University of Colorado Denver that receive encrypted emails from faculty or staff of UC Denver. As a part of our HIPAA compliance
More informationOutlook Web Access (OWA) with Exchange Server 2007 (Windows version)
Outlook Web Access (OWA) with Exchange Server 2007 (Windows version) 1. Login into your Baylor email account via a web browser such as Internet Explorer, Fire Fox, or Netscape. The web URL is still http://mail.baylor.edu/
More informationSecure Email - Customer User Guide How to receive an encrypted email
How to receive an encrypted email This guide has been developed for customers/suppliers of Glasgow City Council who are due to receive sensitive information from us. It will explain how to use our secure
More informationSECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011
SECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011 Introduction In October, 2008, the Division of Welfare and Supportive Services (DWSS) announced the introduction of secure e-mail through ASM 17-08.
More informationU.S. Bank Secure Mail
U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email
More informationVanguard Secure E-Mail Service (VSES) User Guide
Vanguard Secure E-Mail Service (VSES) User Guide Information Security Department January 8, 2013 Contents Guide for Users of Secure E-Mail From Vanguard 1 View Secure E-Mail 1 New Registration 3 Compose
More informationP309 - Proofpoint Encryption - Decrypting Secure Messages Business systems
Procedure P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems P309 - Page: Page 1 of 12 Date of Release: 23 February 2011 Status: Final Document Reference: Title: P309 Release Number:
More informationUsing Voltage SecureMail
Using Voltage SecureMail Using Voltage SecureMail Desktop Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending a secure email as easy as sending it without encryption.
More informationTriCore Secure Web Email Gateway User Guide 1
TriCore Secure Web Email Gateway User Guide This document provides information about TriCore Secure Web Email Gateway. This document is for users who are authorized to send and receive encrypted email
More informationPage 1 Rev Date: February 2010. User Manual for Encrypted Email Services
Page 1 User Manual for Encrypted Email Services Instructions for Using Encrypted Email Services This document is being provided to assist you in opening encrypted emails sent from Century Bank. The following
More informationStewart Secure Email User Guide. March 13, 2015
Stewart Secure Email User Guide March 13, 2015 Table of Contents Introduction... 1 What is secure email?... 1 Why secure email?... 1 What is personal, non-public information?... 1 How is my data protected?...
More informationJumble for Microsoft Outlook
Jumble for Microsoft Outlook Jumble is a zero knowledge, end- to- end email encryption solution that integrates with existing email platforms. Jumble integrates at the email client level and removes the
More informationUsing etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
More information4. Click Next and then fill in your Name and E-mail address. Click Next again.
NOTE: Before installing PGP, Word needs to be disabled as your editor in Outlook. In Outlook, go to Tools: Options: Mail Format and uncheck Use Microsoft Office Word to edit e-mail messages. Failure to
More informationReceiving Secure Email from Citi For External Customers and Business Partners
Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure
More informationWelcome to HomeTown Bank s Secure E-mail! User Guide
Welcome to HomeTown Bank s Secure E-mail! User Guide To access the secure email message center, click the Secure Email link on the www.htbmn.com main web page. Select whether you are a new user of the
More informationInstructions For Opening UHA Encrypted Email
Receiving Encrypted Email You have received a secure, encrypted message from UHA. The message will contain the following notice and an attachment named SecureMessageAtt.hml. The attachment is shown circled
More informationDivision of School Facilities OUTLOOK WEB ACCESS
Division of School Facilities OUTLOOK WEB ACCESS New York City Department of Education Office of Enterprise Development and Support Applications Support Group 2011 HELPFUL HINTS OWA Helpful Hints was created
More informationSECURE Email User Guide
SECURE Email User Guide Receiving SECURE Email from Starion Financial Starion Financial is now offering an enhanced email encryption tool, IronPort PXE, which enables the email communication of sensitive
More informationEmail Encryption Procedures
Email Encryption Procedures Contents: I. Compose an Encrypted Message II. What Your Recipients Will Receive a. Registering a NewAccount b. Logging into a Created Account c. Reading and Replying III. Reading
More informationChildren s Service. Secure Email Guide for external users
Children s Service Secure Email Guide for external users Contents 1. Secure email introduction 2. receiving a secure email for the first time 3. Logging on to the secure email portal 4. Changing your password
More informationSECURE EMAIL USER GUIDE OUTLOOK 2000
WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP
More informationHow To Send An Encrypted Email To The State From The Outside (Public)
Section 1. How to Send an Encrypted E-mail from the Private Network/State Employee The following conditions must be true to send an encrypted e-mail using Proofpoint e-mail encryption: Your State Agency
More informationE-mail Encryption. How do I send my e-mail encryption key?
E-mail Encryption SecurenCrypt e-mail encryption was designed to work as a plug-in with Microsoft Outlook. The following instructions are geared toward users encrypting e-mail with Outlook. However, throughout
More informationSecure E-mail FAQs 1
Secure E-mail FAQs 1 P age Table of Contents Secure E-Mail Overview... 3 Options for viewing secure e-mail... 3 Delivery Option Decision Tree... 4 Before you start using Secure E-mail... 4 To use a PGP
More informationDirectory and Messaging Services Enterprise Secure Mail Services
Title: Directory and Messaging Services Enterprise Secure Mail Services Enterprise Secure Mail Services for End Users Attention: Receivers of Secure Mail Retrieval of Secure Mail by the Recipient Once
More informationsmarshencrypt User s Guide
Versions Addressed: smarshencrypt 2.0 Document Updated: 7/30/2010 Copyright 2010 Smarsh, Inc. All rights Purpose: This document will guide the end user in receiving and viewing smarshencrypt secure messages.
More informationUsing Entrust certificates with Microsoft Office and Windows
Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
More informationE-mail Encryption Recipient Guidelines
E-mail Encryption Recipient Guidelines Canadian Western Bank Group Human Resources Department November 1, 2013 This reference guide was developed for training and reference use only. Any discrepancies
More informationReceiving Secure Emails
Receiving Secure Emails This document explains how you can access emails that have been sent to you through CyberArk s Secure Email system in several simple steps. When you receive a secure email, you
More information1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6
MailTrack How To Document 27 March 2014 Table of Contents 1. How to Register... 2 2. Forgot Password... 4 3. Login to MailTrack Webmail... 5 4. Accessing MailTrack message Centre... 6 5. Creating a MailTrack
More informationINET1005 May 2009 Getting Started with MyUH Email
INET1005 May 2009 Getting Started with MyUH Email Introduction Introduction... 1 Overview... 1 My E-mail Inbox Channel... 2 MyUH E-mail Center... 3 Address Book... 5 Email Options... 6 Help... 6 Exit...
More informationE Mail Encryption End User Guide
E Mail Encryption End User Guide TABLE OF CONTENTS Why Use Email Encryption... 2 What is a Registered Envelope... 2 Features & Benefits... 2 Security Policies... 2 How to Compose and Send an Encrypted
More informationBlackBerry Internet Service. Version: 4.5.1. User Guide
BlackBerry Internet Service Version: 4.5.1 User Guide Published: 2014-05-22 SWD-20140522173857703 Contents 1 Getting started...7 About the messaging service plans for the BlackBerry Internet Service...7
More informationHow To Set Up Your Email
How To Set Up Your Email Contents Page Microsoft Outlook 1 Outlook Express 6 7 Webmail (this is for those who do not use an email programme) 12 Windows Live Mail 22 Mozilla Thunderbird 26 Windows Mail
More informationSecure Email Client Guide
PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing
More informationSecure Email User Guide
Secure Email User Guide Contents Secure email at HSBC. 2 About SecureMail... 2 Receiving a secure email sent via SecureMail 3 Opening a secure email sent via SecureMail... 4 Resetting your SecureMail password..
More informationInitial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion
Initial Setup of Microsoft Outlook Concept This document describes the procedures for setting up the Microsoft Outlook email client to download messages from Google Mail using Internet Message Access Protocol
More informationIntroduction to Webmail for staff
Introduction to Webmail for staff Contents: Starting Webmail Login screen Your inbox Composing a message Attachments Replying to emails Forwarding a message Address book Deleting messages Automatic email
More informationSecure Email User Guide. Guidance for Recipients of Secure Email Messages from Lloyds Banking Group
Guidance for Recipients of Secure Email Messages from Lloyds Banking Group Version: 1.3 Last updated: 14/04/2016 1 Introduction This user guide is intended for third party email users users who receive,
More informationOrbital ATK Secure Email: Receiving Encrypted Messages. Why Orbital ATK Secure Email? Initial Email: Orbital ATK Secure Email Notification
Orbital ATK Secure Email: Receiving Encrypted Messages This document is intended for Orbital ATK Employees, Partners & Clients as an introduction & instructional user guide for Orbital ATK Secure Email.
More informationHow to access your email via Outlook Web Access
How to access your email via Outlook Web Access 1) Open your internet browser and type in the following address: www.law.miami.edu * Aol users must minimize their browser and use Internet Explorer 6.0+
More informationHow To Use Webmail. Guiding you through the Universities online email
How To Use Webmail Guiding you through the Universities online email Table of Contents LOGGING ON...2 VIEWING MESSAGES...2 SENDING A MESSAGE...3 Using the University s Address Book...3 To send a message
More informationHow to Send an Encrypted Email via KDADS' Outlook Client or Outlook Web Application
How to Send an Encrypted Email via KDADS' Outlook Client or Outlook Web Application In order to ensure Personal Health Information (PHI) and Personally Identifiable Information (PII) is protected, KDADS
More informationWord Secure Messaging User Guide. Version 3.0
Word Secure Messaging User Guide Version 3.0 Copyright 2007-2013 WordSecure, LLC. All Rights Reserved. Page 1 of 7 1. Introduction Word Secure Messaging is a program that allows you to exchange encrypted
More informationUsing your Encrypted BlackBerry
Using your Encrypted BlackBerry How do I change the Language on my BlackBerry? 1. On the Home screen or in a folder, click the Options icon. 2. Click Typing and Input > Language. 3. To change the display
More informationEMAIL: How to setup Outlook and Outlook Web Access (OWA) to give a send receipt and a read receipt (Options)
EMAIL: How to setup Outlook and Outlook Web Access (OWA) to give a send receipt and a read receipt (Options) Versions: Outlook 2003 and OWA 2003 Purpose: To show how a user can setup an email message such
More informationArchive Add-in User Guide
Archive Add-in User Guide RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE OF PROPRIETARY INFORMATION Copyright 2011 McAfee, Inc. This document contains information that is proprietary and confidential to
More informationRecalling A Sent Message in Outlook 2010
Recall or replace an email message that you sent The recall feature in Microsoft Outlook tries to stop delivery and, optionally, replace an email message that you have already sent to another Microsoft
More informationSecure Email A Guide for Users
Secure Email A Guide for Users October 14, 2013 10/13 TABLE OF CONTENTS USING THE SYSTEM FOR THE FIRST TIME... 3 EMAIL NOTIFICATION OF SECURE INFORMATION... 3 GETTING REGISTERED ON THE SYSTEM... 4 ACCOUNT
More informationInitial Setup of Microsoft Outlook with Google Apps Sync for Windows 7. Initial Setup of Microsoft Outlook with Google Apps Sync for Windows 7
Microsoft Outlook with Initial Setup of Concept This document describes the procedures for setting up the Microsoft Outlook email client to download messages from Google Mail using Internet Message Access
More informationSecure Email User Guide. PGP (Pretty Good Privacy)
Secure Email User Guide PGP (Pretty Good Privacy) 1 Contents 1 Introduction... 3 2 PGP Web Messenger... 4 3 Enrolling as a PGP Web Messenger User... 4 4 How to use PGP Web Messenger... 6 4.1 Mailbox access...
More informationDepartment of Alcohol & Drug Programs. Information Management Services Division (IMSD) EMAIL ENCRYPTION INSTRUCTIONS
Department of Alcohol & Drug Programs (IMSD) EMAIL ENCRYPTION INSTRUCTIONS July 1, 2010 Why Do We Need Email Encryption? Code of Regulations, Title 45, Subtitle A, Part 164 The Health Insurance Portability
More informationSecure Mail Registration and Viewing Procedures
Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email
More informationSecure Email Actions for Email Recipients
Secure Email Actions for Email Recipients Actions for Email Recipients The recipient cannot forward encrypted email outside the secure system. Each email will only be available to the recipient for 30
More informationUsing the PeaceHealth Secure E-mail System
1 PeaceHealth is using a Secure E-mail System that allows for secure E-mail communications between individuals with a PeaceHealth E-mail address and individuals with E-mail addresses outside the PeaceHealth
More informationWakefield Council Secure email and file transfer User guide for customers, partners and agencies
Wakefield Council Secure email and file transfer User guide for customers, partners and agencies The nature of the work the council carries out means that we often deal with information that is sensitive
More informationFDIC Secure Email Procedures for External Users April 23, 2010
FDIC Secure Email Procedures for External Users April 23, 2010 This document contains information proprietary to the Federal Deposit Insurance Corporation. Table of Contents 1. Introduction...2 2. Receiving
More informationUsing the Web email service
Using the Web email service This booklet describes the web based email service used by Sandwell schools. The web based email service was introduced in January 2005 to replace an earlier webmail system.
More informationThis document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee.
Email Encryption User Guide Sterne Agee is committed to the security of your information. We have implemented Cisco Email Encryption to secure email communication so that only you can open it.* Questions?
More informationFile Share Service User guide
File Share Service User guide Version: 2.0 Written by: Sriram Rao Last Modified: 03/16/2012 1 Index Index... 2 Overview... 3 Change Log... 4 Login Instructions... 5 Searching files by name or content...
More informationMSGCU SECURE MESSAGE CENTER
MSGCU SECURE MESSAGE CENTER Welcome to the MSGCU Secure Message Center. Email is convenient, but is it secure? Before reaching the intended recipient, email travels across a variety of public servers and
More informationBlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8
BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8 User Guide SWDT653811-793266-0827104650-001 Contents Getting started... 3 About messaging service plans for BlackBerry
More informationADP Secure Email Client User Guide
ADP Secure Email Client User Guide A Guide to Exchanging Secure Emails Using the Voltage SecureMail System Version 1.0 July 2008 2008 ADP, Inc. Copyright Information ADP provides this publication as is
More informationI. Configuring Digital signature certificate in Microsoft Outlook 2003:
I. Configuring Digital signature certificate in Microsoft Outlook 2003: In order to configure Outlook 2003 to use the new message security settings please follow these steps: 1. Open Outlook. 2. Go to
More informationClass Outline. Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account
EMAIL Basics Class Outline Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account Part 3 Managing Your Messages Deleting messages The Trash
More informationNationstar Mortgage Secure Email Client User Guide
Nationstar Mortgage Secure Email Client User Guide A Guide to Exchanging Secure Emails Using the Nationstar Mortgage Secure Email Message Center Version 1.0 July 2010 1 Nationstar Public Copyright Information
More informationUSER GUIDE. This user guide covers the following topics: Getting to know the email interface. Attaching a document to an email
LGfL EMAIL USER GUIDE This user guide covers the following topics: Logging on Getting to know the email interface Getting new messages Reading messages Writing a new message Attaching a document to an
More informationBaylor Secure Messaging. For Non-Baylor Users
Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7
More informationRegistering at the Securemail site
Registering at the Securemail site Before using the Secure Mail service for the first time, you must perform a one-time service registration by completing the following steps. 1. When a Secure Mail is
More information10/28/2013. Partners Zixmail Web Portal. Provider Training. Let s Get Started!
Partners Zixmail Web Portal Provider Training Let s Get Started! 1 Setting Up Your Partners Zixmail Web Portal There are two methods to begin this process. Option #1 Use the link on the Partners Provider
More informationReading mail via the Web on Mail.uh.edu
Reading mail via the Web on Mail.uh.edu Connecting to mail via the Web Once you have obtained your userid and password, go to the Web Site http://mail.uh.edu You will see the following screen: Click Log
More informationDivision of Public and Behavioral Health (DPBH) INTRODUCTION TO SECURE EMAIL. Updated October 2015
What is secure email? Division of Public and Behavioral Health (DPBH) INTRODUCTION TO SECURE EMAIL Updated October 2015 Secure email ensures that Personal Information (PI), Personal Health Information
More informationS-Doc User Guide. Instructions on using the Secure Document Online Courier with the CAAT Pension Plan. September 2012
S-Doc User Guide Instructions on using the Secure Document Online Courier with the CAAT Pension Plan Secure solution provided by Accellion September 2012 S E C U R E C O L L A B O R A T I O N U S E R G
More informationPREMIUM MAIL ADMINISTRATOR GUIDE
PREMIUM MAIL ADMINISTRATOR GUIDE WHO THIS USER GUIDE IS FOR This document is for the: Administrator of the BigPond Premium Mail service. Users who have purchased the Solo Manager or a Solo Manager Plus
More informationUSC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9
About ShareFile When you wish to send someone a file or need a file from someone else, your best option is to use ShareFile. It not only provides increased security by automatically encrypting files but
More informationMimecast Services for Outlook (MSO4)
Mimecast Services for Outlook (MSO4) End User Quick Start Guide for Outlook 2010/2013 Mimecast Services for Outlook (MSO 4) is a software application that integrates with your Microsoft Outlook. Once installed,
More informationUSING YOUR LOGIX HOSTED E-MAIL
USING YOUR LOGIX HOSTED E-MAIL Who needs this User Guide? Your company s employee commonly referred to as the E-mail Administrator who will be responsible for administering the LOGIX hosted E-mail. Why
More informationPREMIUM MAIL USER GUIDE
PREMIUM MAIL USER GUIDE WHO THIS USER GUIDE IS FOR This document is for users of BigPond Premium Mail. It describes the features of BigPond Premium Mail from a user s perspective. It contains: A general
More informationSecureMail User Guide
SecureMail User Guide Contents Secure email at HSBC. 2 About SecureMail... 2 Receiving a secure email sent via SecureMail 3 Opening a secure email sent via SecureMail... 4 Using SecureMail to reply to
More informationWebmail Access. Contents
Webmail Access Contents Introduction... 2 Client Webmail and password settings... 2 OPTION1 : Log onto Webmail... 2 Webmail Control Panel... 3 Read Your Email Online... 4 OPTION 2: Configure the local
More informationCryptshare for Outlook User Guide
Cryptshare for Outlook User Guide V1.6.2 Befine Solutions AG Werthmannstr. 15 79098 Freiburg i. Br. Germany Web: https://www.cryptshare.com E-Mail: info@cryptshare.com Tel.: +49 761 389 13 0 Fax: +49 761
More informationSaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies
More informationQuick Start : i-fax User Guide
Quick Start : i-fax User Guide Introduction Welcome to the i-fax System User Guide! This manual will help new users navigate i-fax System and perform common tasks. This manual is task-oriented. You will
More informationSecure Email Client User Guide Receiving Secure Email from Mercantile Bank
Receiving Secure Email from Contents This document provides a brief, end-user overview of the Secure Email system which has been implemented by. Why Secure Email? When someone sends you an email, the email
More informationRecipients Guide for Email Encryption Version 1.2
Recipients Guide for Email Encryption Version 1.2 Document Location n/a Copies can be requested from the IT Dept 01603 50 8622 Revision Previous Revision by Summary of Changes Version date revision date
More informationInitial Setup of Mozilla Thunderbird with IMAP for Windows 7
Initial Setup of Mozilla Thunderbird Concept This document describes the procedures for setting up the Mozilla Thunderbird email client to download messages from Google Mail using Internet Message Access
More informationDATA PROTECTION. OneWorld Encrypted Messages USER GUIDE
DATA PROTECTION OneWorld Encrypted Messages USER GUIDE Table of Contents 1 Why use Encrypted emails?... 3 2 Activation and Login... 4 2.1 Activating Your New OneWorld Encrypted Messages Account... 4 2.2
More informationBorough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments
Borough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments V8 Contents What is Encryption?...3 Why do I need to know about it?...3 How do I use it?...3 What
More information1. Navigate to Control Panel and click on User Accounts and Family Safety. 2. Click on User Accounts
This document will guide you through setting up your outgoing server (SMTP) Microsoft Outlook and Windows Live Mail. There is also a section below that guides you through the manual configuration of your
More informationSecure Email Recipient Guide
Secure Email Recipient Guide Contents How to open your first Encrypted Message.... 3 Step-by-Step Guide to Opening Your First Envelope... 3 Step One:... 3 Step Two:... 4 Step Three:... 4 Step Four:...
More informationSecure Email User Guide
Secure Email User Guide Transport Layer Security (TLS) Pretty Good Privacy (PGP) PDF Messenger 1 Contents 1 Introduction... 3 2 Transport Layer Security (TLS).4 3 Pretty Good Privacy (PGP).5 4 PDF Messenger...
More informationOnline Banking Quick Reference Guide
1 Page 2 Set Up and Access to Online Banking 2 How do I set up Online Banking? 2 How do I sign in to Online Banking? Online Banking Quick Reference Guide 3 Security 3 How do I change User ID? 3 What should
More information