Weapon System (EWS)
|
|
|
- Lynne Walker
- 10 years ago
- Views:
Transcription
1 This Overall Classification of this Presentation is Weapon System (EWS) (AKA: Microsoft Outlook) LCDR Greg Taylor BUPERS IAM The information presented in this brief is current as of 17 January 2012
2 What Do All of These Have in Common? 2
3 Weapon System (EWS) Safeties Launch Button Targets Payload 3
4 Presentation Outline Policy & Guidance Encryption, Sensitive Information Sensitive vs. Non-sensitive PII Encryption Example Digital Signature Ready Aim Fire Misfire Procedures Troubleshooting Techniques Understanding Common Alerts Affects of Digital Signature and Encryption on Size PII Breach Reporting Procedures Myths Debunked Moving Forward 4
5 Policy & Guidance R Z DEC 04 CNO WASHINGTON DC DIGITALLY SIGNING SENT WITHIN DOD HAS BEEN REQUIRED SINCE 1 APRIL 2004, OR AS THE WORKSTATION HARDWARE IS PROVIDED. REQUIRING MESSAGE INTEGRITY AND/OR NON-REPUDIATION MUST BE DIGITALLY SIGNED. ENCRYPT CONTAINING SENSITIVE INFORMATION AS DEFINED BY REF B (E.G., PRIVACY ACT INFO, HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT INFO, CONTRACT INFO, FOUO, ETC.) AND THAT DISCUSSES ANY MATTER THAT MAY SERVE AS AN OPSEC INDICATOR. NAVADMIN 248/08 DIGITAL SIGNING OF S IS A REQUIREMENT ACROSS DOD. ALL S REQUIRING DATA INTEGRITY, MESSAGE AUTHENTICITY, AND/OR NONREPUDIATION MUST BE DIGITALLY SIGNED. THIS INCLUDES ANY THAT: A. DIRECTS, TASKS, OR PASSES DIRECTION OR TASKING. B. REQUESTS OR RESPONDS TO REQUESTS FOR RESOURCES. C. PROMULGATES ORGANIZATION, POSITION, OR INFORMATION EXTERNAL TO THE ORGANIZATION (DIVISION, DEPARTMENT, OR COMMAND). D. DISCUSSES ANY OPERATIONAL MATTER. E. DISCUSSES CONTRACT INFORMATION, FINANCIAL, OR FUNDING MATTER. F. DISCUSSES PERSONNEL MANAGEMENT MATTERS. G. THE NEED EXISTS TO ENSURE THAT THE ORIGINATOR IS THE ACTUAL AUTHOR. H. THE NEED EXISTS TO ENSURE THAT THE HAS NOT BEEN TAMPERED WITH IN TRANSIT. I. IS SENT FROM A DOD-OWNED SYSTEM OR ACCOUNT WHICH CONTAIN AN EMBEDDED HYPERLINK (E.G., ACTIVE LINK TO A WEB PAGE, WEB PORTAL, ETC.) MUST BE DIGITALLY SIGNED. PURE TEXT REFERENCES (NON-ACTIVE INTERNET LINKS) TO WEB ADDRESSES, UNIFORM RESOURCE LOCATORS (URL), OR ADDRESSES DO NOT REQUIRE A DIGITAL SIGNATURE. J. IS SENT FROM A DOD-OWNED SYSTEM OR ACCOUNT WHICH CONTAIN AN ATTACHMENT (ANY TYPE OF ATTACHED FILE) MUST BE DIGITALLY SIGNED. DON CIO Resources: DON Digital Signature and Encryption Policy for s Containing PII How to sign and encrypt s Marking of s containing sensitive data or attachments 5
6 Encryption Must be used for s containing unclassified, sensitive information. Used to provide reasonable assurance that the can only be accessed by the intended recipient(s). (Confidentiality) Accomplished using both symmetric (one key used for both encryption and decryption) and asymmetric (key pair is used: one for encryption, one for decryption, and vice versa) methods. Protects both the message and the attachment(s). Must be selected manually for each individual . Outlook can be configured for automatic encryption, but this setting cannot be changed permanently. Follow the procedure below to temporarily set encryption as a default: Outlook: Tools -> Trust Center -> Security -> 6
7 , Sensitive Information From Navy Policy: Privacy Act info (the DoD R (p. 39) lists information types that are normally releasable) Health Insurance Portability and Accountability (HIPAA) info Contract info For Official Use Only info (the DoD R (p. 138) lists the FOUO exemption categories) OPSEC indicators Others: Pre-decisional info Other information deemed sensitive by the originator 7
8 Sensitive vs. Non-sensitive PII Must be protected Sensitive PII includes but is not limited to: Name and other names used (in a sensitive context); Social Security number, full and truncated; Driver's license and other identification numbers; Citizenship, legal status, gender, race/ethnicity; Birth date, place of birth; Home and personal cell telephone numbers; Personal address, mailing and home address; Religious preference; Security clearance; Mother's middle and maiden names; Spouse information, marital status, child information, emergency contact information; Biometrics; Financial information, medical information, disability information; Law enforcement information, employment information, educational information; and Military records. PII, but usually does not need to be protected Non-sensitive PII includes but is not limited to: Name and other names used (in a non-sensitive context); Rank; Office location; Business telephone number; Business address; Badge number; and Other information that is releasable to the public. Note: The context of the information must also be taken into account when determining if it is sensitive or non-sensitive PII. For example, a list of personnel with office phone numbers would be considered non-sensitive PII. However, if this same list also indicated that these individuals had contracted a terminal disease, it would now be considered sensitive PII. 8
9 Encryption Example Sender Receiver Message and Attachments Randomly Generated Symmetric Key Encryption Algorithm Encryption Algorithm Encryption Algorithm 1 3 Encryption Algorithm GAL Priv + Pub Contacts Certificate Pub Pub Pub Pub Pub Pub Certificates Pub 1 Certificate Pub = Public Key Priv = Private Key 9
10 Digital Signature Must be used for s containing official business, attachments, or embedded links. Used to provide reasonable assurance that an message has not been modified in transit (Integrity) and that the sender of the message is who he/she claims to be (Authenticity). Inability of sender to deny that he/she sent a message (Non- Repudiation). Provides no confidentiality. Message digest is encrypted not the message. Message and attachments can be sent to and read by any recipient. Default setting for Outlook on NMCI machines has digital signature selected. 10
11 Digital Signature Example Sender Receiver 1 Message and Attachments Hashing Function 3 2 Pub Certificate + Message Digest Encryption Algorithm 3 Encryption Algorithm Hashing Function 4 Priv Pub 5 Compare If not identical, notify receiver Certificate Pub = Public Key Priv = Private Key 11
12 Ready Aim Fire! Ready: Draft, attach, digitally sign (if not already selected), and encrypt (if required). Open each attachment to ensure only intended files are attached. If the body or attachment contains sensitive PII, add (FOUO) to the subject line If the body contains sensitive PII, mark the with FOR OFFICIAL USE ONLY - PRIVACY ACT SENSITIVE: Any misuse or unauthorized disclosure of this information may result in both criminal and civil penalties. If an attachment contains sensitive PII, add Attachment is FOUO at the top of the message. Attachments containing PII should also have a filename beginning with (FOUO). Aim: If the contains sensitive information, ensure the recipients selected have a need to know. Ensure name(s) selected from the GAL represent the actual intended recipients (e.g., there are 46 John Smiths). Fire: Click Send If failed to send due to encryption issues, follow misfire procedures on the next slide. 12
13 Misfire Procedures DO NOT select Send Unencrypted Select Cancel and remove failed recipient addresses from the Click Send Send separate to unsupported addresses requesting a reply with a digitally signed (address not in the GAL) or to reply after publishing their certificates (address in the GAL). To publish certificates: Outlook: Tools -> Trust Center -> Security -> Right-click on name in reply and select Click on the contact and attempt to send the encrypted again. Note: If using NMCI, published certificates may not be available for a few minutes while servers replicate and/or if the user s GAL is not synced. To manually sync GAL, follow the procedure below: Smith, Joe PO2, Navy Activity; Baker, Jane SGT, Army Base My Computer: System (C:) -> Program Files -> Microsoft Office -> GlobalDirectory -> 13
14 Additional Troubleshooting Techniques (NMCI) If a valid certificate is verified for the recipient, and the still cannot be sent encrypted, try the following: Go to the Outlook toolbar and click on the small arrow next to the button, then download the address book with Full Details (may take 5-10 minutes). Attempt to send encrypted again. Cached Exchange Mode can also cause encryption problems. To check to see if you are in this mode, perform the following in Outlook: Tools -> Account Settings -> Security -> If is checked, uncheck it and then attempt to send encrypted again (note: you will be required to shutdown and restart Outlook for the new settings to take effect). Recheck after is sent (if desired). 14
15 Understanding Common Alerts Invalid digital signature Inability to open old encrypted s Go to: Select the appropriate key to recover, then follow the instructions 15
16 Affect of Digital Signature and Encryption on Size x 16/9 10 Size of after sending (in MB) x 4/ Digitally Signed and Encrypted Digitally Signed or Encrypted Plain Size of before sending (in MB) 16
17 PII Breach Reporting Policy DON CIO MESSAGE: DTG: Z FEB 08 DON PERSONNEL WHO HAVE DISCOVERED A KNOWN OR SUSPECTED LOSS OF PII MUST REPORT THE BREACH TO THEIR SUPERVISOR. COMMANDS/ACTIVITIES WILL DESIGNATE AN OFFICIAL IN THE CHAIN OF COMMAND RESPONSIBLE FOR REPORTING PII BREACHES AND TO SERVE AS A POINT OF CONTACT (POC) FOR FOLLOW-UP ACTIONS AND INDIVIDUAL NOTIFICATIONS. PER REF B, THE TERM BREACH IS USED TO INCLUDE THE LOSS OF CONTROL, COMPROMISE, UNAUTHORIZED DISCLOSURE, UNAUTHORIZED ACQUISITION, UNAUTHORIZED ACCESS, OR ANY SIMILAR TERM REFERRING TO SITUATIONS WHERE PERSONS OTHER THAN AUTHORIZED USERS, FOR OTHER THAN AUTHORIZED PURPOSE, HAVE ACCESS OR POTENTIAL ACCESS TO PII, WHETHER PHYSICAL OR ELECTRONIC. WITHIN ONE HOUR OF THE DISCOVERY OF A LOSS OR SUSPECTED LOSS OF PII, NOTIFY VIA A SINGLE THE FOLLOWING PRIVACY OFFICIALS AND AGENCIES OF THE LOSS: DON CIO Resources: PII Breach Reporting Resources Automated reporting form Sample notification letter Breach consequences for military, civilians, and contractors 17
18 Myths Debunked Sending a Digitally Signed within the GIG provides the same protection as encryption. The GIG is not a secure environment. Only encrypted s will provide reasonable assurance of confidentiality. If you are having problems sending an encrypted to someone, get them to send you an encrypted . This may work, but only because the sender s was also digitally signed. Last four of a member SSN is not sensitive PII. According to the DON CIO, a member s SSN, in its full or truncated form, is sensitive PII. A member can choose to transmit his/her own private information unencrypted. Policy does not exempt individuals from exposing their own personal information. A member cannot send a digitally signed or an encrypted to a recipient outside of the GIG. Digitally signed can be sent outside the GIG with no difficulty. Encrypted can be sent outside the GIG as long as the sender has access to the recipient s public key, and this key is trusted by the sender. 18
19 Moving Forward If you are in the habit of sending sensitive information over unprotected, STOP. Use the Ready Aim Fire method If you are having trouble sending encrypted , conduct the misfire procedures. DO NOT get frustrated and just click send. If you can t figure it out, get help from a coworker, contact your IAM, or call NMCI. If you send or receive an containing sensitive information that was not encrypted, REPORT IT. Notify your supervisor Contact your Command Privacy Officer If you are a supervisor, send an encrypted test to your subordinates on a periodic basis to ensure their certificates are published. 19
20 Slides 1, 18, and 19 have no notes. Slide 2 This slide is meant to show that clicking send on an is just like pulling a trigger. Users need to realize that s have the potential to cause damage; therefore, they must ensure not only that sensitive information is protected, but also that this information is sent only to those with a need to know. Understanding the Navy s policy and how works (specifically the difference between encryption and digital signature) should lower the potential for PII breaches. Slide 3 This slide is meant to show that although is like a loaded weapon that has the potential to cause damage, there are some safeties available to the user. This brief focuses on how these safeties work and when they should be used. The hope is that a better understanding of policy and protection mechanisms will keep the Navy moving towards a culture that is more information protection conscious. Slide 4 The brief starts with the Navy s policy on encryption and digital signature, mostly to show under what circumstances they are required to be used and that information does not have to be PII to be sensitive. The next part of the brief examines encryption and digital signature to provide a better understanding of what they can and can t do. Ready Aim Fire is the biggest takeaway of this brief. Users need to treat like a weapon system to help minimize the probability of exposing sensitive information. Frustration with encryption may be one reason why users do not like using it; therefore, the brief covers misfire procedures to help users overcome common encryption issues. Finally, PII breach procedures are communicated along with a slide showing how past breaches have impacted the NPC organization. The importance of trust in the organization cannot be overstated. Slide 5 The requirement to encrypt sensitive s has been around since It is interesting to note that the requirement applies not only to PII, but also other potentially sensitive information like contracting and OPSEC indicators. Another example could be pre decisional materials that address controversial or sensitive issues (e.g., manning). R Z DEC 04 CNO WASHINGTON DC:
21 NAVADMIN 248/08: DON Digital Signature and Encryption Policy for s Containing PII: Slide 6 Outlook uses both symmetric and asymmetric encryption techniques when encrypting . An attachment does not need to be password protected if the it is attached to is encrypted. Although okay to use for Office 2007 applications, password protected files introduce additional problems, like the need to send the password out of band. (Note: Office 2003 password protection has known vulnerabilities whereas Office 2007 uses a NSA approved encryption algorithm). Slide 7 Sensitive PII is a subset of unclassified, sensitive information. The FOUO marking is widely misused. There are nine exemption categories that stipulate what information may be marked FOUO, which protects the information from public release. DoD R : DoD R: Slide 8 The DON makes a distinction between sensitive and non sensitive PII ( Non sensitive PII, like business and business phone number, is releasable to the public and usually does not need to be protected or reported as a breach if compromised. Note: Last four is sensitive PII! Always consider the context of the information. If in doubt, encrypt! Slide 9 Receiver/Sender 1. Before encryption will work, the recipient must publish his/her certificate to the GAL, or the sender must have the recipient s certificate in his/her contacts list (which is accomplished by saving a contact from a digitally signed ). The recipient s certificate contains his/her public key this key is used in the encryption process. Sender
22 1. The text of the and any attachments comprise the message. 2. This message is encrypted using a randomly generated symmetric encryption key. 3. The randomly generated key is encrypted with the recipients public key. 4. Both the encrypted message and the encrypted symmetric key are grouped together to form an encrypted . Receiver 1. When the encrypted is opened, its payload yields both the encrypted message and the encrypted symmetric key. 2. The encrypted symmetric key is decrypted using the receiver s private key. The private key is located on the receiver s CAC, and it can be used only if the PIN is known. 3. The encrypted message is then decrypted using the decrypted symmetric key that was randomly generated by the sender. Because only the recipient of the possesses the corresponding private key of the public key that was used to encrypt the symmetric key (which was used to encrypt the message), we can reasonably conclude that the message is only accessible to the recipient (confidentiality). Slide 10 Digital signature is not encryption. Digital signature only guarantees that the sender is who he/she claims to be and that the message was not modified in transit. Slide 11 Sender 1. The text of the and any attachments comprise the message. 2. This message of varying size is then passed through a hashing function. This one way hashing function produces a fixed size output called a message digest. No matter what size the message, the message digest will always be a fixed length (for SHA 1, this length is 160 bits). Any change in the message will produce a dramatically different message digest. Note: a hash function is one way because it is impossible to retrieve the original message from the fixed bit output. 3. The message digest is encrypted with the sender s private key. The private key is located on the sender s CAC, and it can be used only if the PIN is known. 4. Both the encrypted message digest, the original message (which includes any attachments), and the sender s certificate (located on the sender s CAC) are grouped together to form a digitally signed . This can be delivered to any account (government or private).
23 Receiver 1. When the digitally signed is opened, its payload yields an encrypted message digest, the original message (which includes any attachments), and the sender s certificate. Note that the message and attachments are not encrypted and can be read by any recipient. 2. The certificate (which contains the public key) is validated via an Internet connection. 3. The encrypted message digest is decrypted using the sender s public key to produce the original message digest. 4. The original message and its attachments are passed through the same hashing function used by the sender, producing a message digest. 5. The decrypted message digest and the message digest created from the received text and its attachments are then compared. If the message digests are identical, we can reasonably conclude that the message was not modified in transit (integrity). And, because we were able to validate the user s certificate and decrypt the message digest in the first place, we can reasonably assume that the message was indeed sent by the person who claimed to have sent the message (authentication) because only that person has access to his/her private key. For this same reason, the person who sent the message also cannot deny having sent the message (non repudiation). Slide 12 The biggest takeaway from this brief is Ready Aim Fire! It is an easy to remember method to check each before clicking send. Also discussed on this slide are marking requirements. Marking subject lines, the message body, and filenames with FOUO alerts the recipient that the /file contains sensitive information. Users need to be confident that recipients selected from the GAL are indeed the correct persons and that these persons have a need to know. Slide 13 The reluctance to use encryption may be partly due to the occasional issue encountered when trying to send encrypted . This slide provides step by step procedures of how to deal with these problems. Slide 14 After verifying the recipient s certificates are valid, and an encrypted still cannot be sent, downloading the full details of the address book may solve the problem. Downloading the address book will take about 5 10 minutes. Cached Exchange Mode can also cause encryption problems. Deselecting this mode has proved to allow encrypted s to be sent in some cases.
24 Slide 15 Investigate invalid digital signatures since the may have been spoofed by a third party or the information could have been modified in transit. Also, if opening an old , be aware that the digital signature may no longer be valid if the certificate has expired. The was probably valid when it was originally transmitted. If you cannot open an old encrypted , more than likely you are now using a newer publicprivate key pair than what was used when the older was transmitted. If this is the case, all you need to do is recover your older private key from an escrow account maintained at DISA. This task can be accomplished by visiting the website on the slide, selecting the older certificate (look at the date range to see which one you need), and then follow the instructions. Slide 16 One challenge with sending digitally signed and encrypted is dealing with the fact that the size will grow due to how the message is stored (go to to read Microsoft s explanation of this phenomenon). Digitally signing or encrypting an will increase its size by 4/3 (33%, not including other overhead). Digitally signing and encrypting an will increase its size by 16/9 (78%, not including other overhead). Since it is Navy policy to digitally sign any with attachments, a large size due to both digitally signing and encrypting is a probable occurrence. Slide 17 The requirement to report the potential compromise of PII is well known; however, it is not well known that the breach reporting policy also applies to sent unencrypted containing PII. Sending containing sensitive PII (encrypted or unencrypted) to a person that does not have a need to know (i.e., the information is not needed in the performance of assigned duties) also constitutes a breach, regardless of the position, rank, or clearance of the recipient. All breaches must be reported, but the process needs to include the Chain of Command and the IAM. The decision to send out notification letters to affected members will be adjudicated at the DON CIO and communicated to the command. DON CIO MESSAGE: DTG: Z FEB 08: PII Breach Reporting Resources:
Tactics, Techniques, & Procedures (TTP) Dual Persona Personal Identity Verification (PIV) Authorization Certificate
Tactics, Techniques, & Procedures (TTP) Dual Persona Personal Identity Verification (PIV) Authorization Certificate Version 3.0 23 Jan 2012 This document is not to be distributed or changed without express
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
Using Entrust certificates with Microsoft Office and Windows
Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
Using Voltage SecureMail
Using Voltage SecureMail Using Voltage SecureMail Desktop Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending a secure email as easy as sending it without encryption.
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 CHIEF INFORMATION OFFICER October 1, 2015 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF
AKO Email Shutdown Quick Reference Guide
AKO Email Shutdown Quick Reference Guide NETWORK ENTERPRISE CENTER This guide explains how the Army is shutting down AKO Email and outlines steps you must take to ensure a smooth transition to full DoD
Healthcare Compliance Solutions
Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and
Secure Email Client Guide
PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing
How to Publish Your Smart Card Certificates Using Outlook 2010
How to Publish Your Smart Card Certificates Using Outlook 2010 To send or receive (and read) digitally signed or encrypted email messages with colleagues at NIH, you must first publish your PIV certificate
Introduction to The Privacy Act
Introduction to The Privacy Act Defense Privacy and Civil Liberties Office dpclo.defense.gov 1 Introduction The Privacy Act (5 U.S.C. 552a, as amended) can generally be characterized as an omnibus Code
SECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011
SECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011 Introduction In October, 2008, the Division of Welfare and Supportive Services (DWSS) announced the introduction of secure e-mail through ASM 17-08.
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
How to use Certificate in Microsoft Outlook
How to use Certificate in Microsoft Outlook Macau Post esigntrust Version. 2006-01.01p Agenda Configure Microsoft Outlook for using esigntrust Certificate Use certificate to sign e-mail Use Microsoft Outlook
User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series
User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate
Network FAX Driver. Operation Guide
Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
Vaaler Insurance, Inc. RPost Email. Guidelines and Instructions. Sherry D Samson. rev 10/1/15 by BH
Vaaler Insurance, Inc. RPost Email Guidelines and Instructions Sherry D Samson 2015 rev 10/1/15 by BH Contents RPost Guidelines... 3 Registered Email no encryption or signature required... 5 Registered
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed
Bank of Hawaii Protecting Confidential Email
1 Bank of Hawaii Protecting Confidential Email Email is commonly used to transmit confidential information such as operational data, legal documents, or financial information. By default emails are sent
ONE Mail Direct for Desktop Software
ONE Mail Direct for Desktop Software Version: 1 Document ID: 3931 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2015, ehealth Ontario All rights reserved No part of this document may
Installing your Digital Certificate & Using on MS Out Look 2007.
Installing your Digital Certificate & Using on MS Out Look 2007. Note: This technical paper is only to guide you the steps to follow on how to configure and use digital signatures. Therefore Certificate
HIPAA and Privacy Policy Training
HIPAA and Privacy Policy Training July 2015 1 This training addresses the requirements for maintaining the privacy of confidential information received from HFS and DHS (the Agencies). During this training
Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister
Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister Central Information Management Unit Office of the Prime Minister
EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8
EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8 External Users Decrypting Secure Messages The following sections describe how users external to EJGH receive and decrypt secure messages. Reading
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) 2. Name of IT System: Defense Biometric Identification System (DBIDS)
DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) (Use N/A where appropriate) 1. DoD Component: Defense Manpower Data Center (DMDC) 2. Name of IT System: Defense Biometric Identification System (DBIDS) 3. Budget
HIPAA COMPLIANCE AND DATA PROTECTION. [email protected] +39 030 201.08.25 Page 1
HIPAA COMPLIANCE AND DATA PROTECTION [email protected] +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the TOTAL WORKFORCE MANAGEMENT SERVICES (TWMS) Department of the Navy - CNIC SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system
Bank of Hawaii Protecting Confidential Email. What's in this User Guide
1 Bank of Hawaii Protecting Confidential Email Email is commonly used to transmit confidential information such as operational data, legal documents, or financial information. By default emails are sent
Subject: Department of the Navy Social Security Number (SSN) Reduction Plan Phase Three
DON CIO Message **************** UNCLASSIFIED / **************** Subject: Department of the Navy Social Security Number (SSN) Reduction Plan Phase Three Originator: COLUMBIA/L=WASHINGTON/OU=DON CIO (UC)
Everett School Employee Benefit Trust. Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law
Everett School Employee Benefit Trust Reportable Breach Notification Policy HIPAA HITECH Rules and Washington State Law Introduction The Everett School Employee Benefit Trust ( Trust ) adopts this policy
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
Your Agency Just Had a Privacy Breach Now What?
1 Your Agency Just Had a Privacy Breach Now What? Kathleen Claffie U.S. Customs and Border Protection What is a Breach The loss of control, compromise, unauthorized disclosure, unauthorized acquisition,
Encrypted Email Users Guide. Revised 6/8/2015
Encrypted Email Users Guide Revised 6/8/2015 Contents Encrypted email service overview Registering, activating and maintaining an account Online Help Accessing the encrypted email portal screens Downloading
Outlook Web Access 2003 Remote User Guide
UNITED STATES COAST GUARD Outlook Web Access 2003 Remote User Guide Using Common Access Card Access TISCOM TIS-42 07/29/2008 Version 1.0 CAC Enabled Outlook Web Access CAC Enabled OWA is a way to view
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
E-mail Encryption Recipient Guidelines
E-mail Encryption Recipient Guidelines Canadian Western Bank Group Human Resources Department November 1, 2013 This reference guide was developed for training and reference use only. Any discrepancies
HIPAA 101: Privacy and Security Basics
HIPAA 101: Privacy and Security Basics Purpose This document provides important information about Kaiser Permanente policies and state and federal laws for protecting the privacy and security of individually
WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery
WHITE PAPER HIPPA Compliance and Secure Online Data Backup and Disaster Recovery January 2006 HIPAA Compliance and the IT Portfolio Online Backup Service Introduction October 2004 In 1996, Congress passed
IMPORTANT: You must complete this step before you can install and activate SafeSend.
Initial Setup Guide Welcome to SafeSend! This guide has been created to assist with your initial setup. Please follow the below steps to get started. If you are a Firm Administrator and are setting your
Djigzo S/MIME setup guide
Author: Martijn Brinkers Table of Contents...1 Introduction...3 Quick setup...4 Create a CA...4 Fill in the form:...5 Add certificates for internal users...5 Add certificates for external recipients...7
Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services
Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services Introduction Patient privacy has become a major topic of concern over the past several years. With the majority of
Policy Based Encryption Z. Administrator Guide
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Credit Card Security
Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary
The Department of Health and Human Services Privacy Awareness Training. Fiscal Year 2015
The Department of Health and Human Services Privacy Awareness Training Fiscal Year 2015 Course Objectives At the end of the course, you will be able to: Define privacy and explain its importance. Identify
How to Setup Your MS Outlook Account to Digitally Sign and Encrypt Emails. Setting up your Account to Digitally Sign E-mails
How to Setup Your MS Outlook Account to Digitally Sign and Encrypt Emails Please follow the steps listed below Note Please make sure that the Outlook profile created has an IMAP connection and NOT a Google
Controller of Certification Authorities of Mauritius
Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)
MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Using etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
PHI- Protected Health Information
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
Secure Email Portal. A Step-by-Step Guide for Using KRS ZixCorp Secure Email Solution
Secure Email Portal User Manual A Step-by-Step Guide for Using KRS ZixCorp Secure Email Solution This manual can be found online at https://kyret.ky.gov in the Agency Employers Employer Publications section.
Orbital ATK Secure Email: Receiving Encrypted Messages. Why Orbital ATK Secure Email? Initial Email: Orbital ATK Secure Email Notification
Orbital ATK Secure Email: Receiving Encrypted Messages This document is intended for Orbital ATK Employees, Partners & Clients as an introduction & instructional user guide for Orbital ATK Secure Email.
Pennsylvania Department of Public Welfare. Bureau of Information Systems OBSOLETE. Secure E-Mail User Guide. Version 1.0.
Pennsylvania Department of Public Welfare Bureau of Information Systems Secure E-Mail User Guide Version 1.0 August 30, 2006 Table of Contents Introduction... 3 Purpose... 3 Terms of Use Applicable to
HIPAA COMPLIANCE AND
INTRONIS CLOUD BACKUP & RECOVERY HIPAA COMPLIANCE AND DATA PROTECTION CONTENTS Introduction 3 The HIPAA Security Rule 4 The HIPAA Omnibus Rule 6 HIPAA Compliance and Intronis Cloud Backup and Recovery
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
The Basics of HIPAA Privacy and Security and HITECH
The Basics of HIPAA Privacy and Security and HITECH Protecting Patient Privacy Disclaimer The content of this webinar is to introduce the principles associated with HIPAA and HITECH regulations and is
SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE
SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE Directive Concerning the Colorado Judicial Department Electronic Communications Usage Policy: Technical, Security, And System Management Concerns This
UNITED STATES ARMY RESERVE COMMAND. User Guide for ARAMP
UNITED STATES ARMY RESERVE COMMAND User Guide for ARAMP (Army Reserve Account Maintenance and Provisioning) Document: User Guide for ARAMP Nov. 13 2008 Date: Nov 13, 2006 Table 1: Version History Version
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
HIPAA Information Security Overview
HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is
Document Management Getting Started Guide
Document Management Getting Started Guide Version: 6.6.x Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive Software, Inc. All other
Order. Directive Number: IM 10-3. Stephen E. Barber Chief Management Officer
Pension Benefit Guaranty Corporation Order Subject: Protecting Sensitive Information Directive Number: IM 10-3 Effective Date: 4/23/08 Originator: OGC Stephen E. Barber Chief Management Officer 1. PURPOSE:
Zimbra Connector for Microsoft Outlook User Guide 7.1
Zimbra Connector for Microsoft Outlook User Guide 7.1 March 2011 Legal Notices Copyright 2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual
Receiving Secure Email from Citi For External Customers and Business Partners
Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
REVISION: This directive supersedes TSA MD 3700.4, Handling Sensitive Personally Identifiable Information, dated March 13, 2008.
OFFICE OF THE SPECIAL COUNSELOR Privacy TSA MANAGEMENT DIRECTIVE No. 3700.4 To enhance mission performance, TSA is committed to promoting a culture founded on its values of Integrity, Innovation and Team
TOURO UNIVERSITY WORLDWIDE AND TOURO COLLEGE LOS ANGELES IDENTITY THEFT PREVENTION POLICY 1.0 POLICY/PROCEDURE 2.0 PURPOSE 3.0 SCOPE 4.
TOURO UNIVERSITY WORLDWIDE AND TOURO COLLEGE LOS ANGELES IDENTITY THEFT PREVENTION POLICY 1.0 POLICY/PROCEDURE Touro adopts this identity theft policy to help protect employees, students, contractors and
Adding Digital Signature and Encryption in Outlook
Adding Digital Signature and Encryption in Outlook Using Outlook, the email messages can be signed and encrypted by a digital certificate. To digitally sign a message in Outlook some conditions must be
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5400.11 October 29, 2014 DCMO SUBJECT: DoD Privacy Program References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) 5400.11 (Reference
DIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER
COVER STORY Encrypting Email Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY The leading email applications include new features for helping users secure and authenticate their
How To Encrypt Email With An Email Certificate On An Email From A Gmail Account On A Pc Or Mac Or Ipa (For A Pc) On A Microsoft Gmail (For An Ipa) Or Ipad (For Mac) On
S/MIME Compatibility Assessing the compatibility and best practices of using S/MIME encryption GLOBALSIGN WHITE PAPER Ben Lightowler, Security Analyst GMO GlobalSign Ltd Contents Introduction...3 Why S/MIME
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services
Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services 1 Contents 3 Introduction 5 The HIPAA Security Rule 7 HIPAA Compliance & AcclaimVault Backup 8 AcclaimVault Security and
Zimbra Connector for Microsoft Outlook User Guide. Network Edition 7.0
Zimbra Connector for Microsoft Outlook User Guide Network Edition 7.0 February 2011 Legal Notices Copyright 2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international
Microsoft Outlook 2010. Reference Guide for Lotus Notes Users
Microsoft Outlook 2010 Reference Guide for Lotus Notes Users ContentsWelcome to Office Outlook 2010... 2 Mail... 3 Viewing Messages... 4 Working with Messages... 7 Responding to Messages... 11 Organizing
User Guide. Version 3.0 April 2006
User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark
SECURE MESSAGING PLATFORM
SECURE MESSAGING PLATFORM WEB ADMIN CONSOLE ADMIN USER GUIDE Introduction... 2 Customer Management... 3 Dashboard... 3 User Account... 5 General & Feature Settings... 7 Secure Message Disclaimers... 9
Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services
Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services Page 2 of 8 Introduction Patient privacy has become a major topic of concern over the past several years. With the majority
GlobalSign Solutions. Using a GlobalSign PersonalSign Certificate to Apply Digital Signatures in Microsoft Office Documents
GlobalSign Solutions Using a GlobalSign PersonalSign Certificate to Apply Digital Signatures in Microsoft Office Documents 1 TABLE OF CONTENTS Introduction... 3 Types of Signatures... 3 Non visible Signatures....
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
HIPAA: In Plain English
HIPAA: In Plain English Material derived from a presentation by Kris K. Hughes, Esq. Posted with permission from the author. The Health Insurance Portability and Accountability Act of 1996 (HIPAA), Pub.
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
