USE OF COOKIES & THE EU COOKIE LAW
|
|
|
- Barnaby Pierce
- 9 years ago
- Views:
Transcription
1 USE OF COOKIES & THE EU COOKIE LAW What is a cookie? A cookie is a little text file composed of alphanumeric characters, which is created on your computer when your browser accesses a website that uses cookies. The files are used to help your browser navigate the website and fully use all its features like logins, preferences, language settings, themes, among other common features. The cookie is used solely to help your browser process a website; it does not collect any information from your computer or snoop on your files. Cookie files are typically stored in the cookie file of your browser. Each file normally contains: The name of the website server that created the cookie The duration of the cookie- how long your browser can use the cookie information to access the website that created the cookie A cookie value- this unique information is normally a randomly generated number The server that created the cookie uses the cookie value to remember you when you come back to the site or navigate from one page to another. Only the server that created the cookie can read and process the cookie. Cookies can expire at the end of a browser session (from when a user opens the browser window to when they exit the browser) or they can be stored for longer. The Regulations apply to both types of cookies: Session cookies allow websites to link the actions of a user during a browser session. They may be used for a variety of purposes such as remembering what a user has put in their shopping basket as they browse around a site. They could also be used for security when a user is accessing internet banking or to facilitate use of webmail. These session cookies expire after a browser session so would not be stored longer term. For this reason session cookies may sometimes be considered less privacy intrusive than persistent cookies. Persistent cookies are stored on a user's device in between browser sessions which allows the preferences or actions of the user across a site (or in some cases across different websites) to be remembered. Persistent cookies may be used for a variety of purposes including remembering users preferences and choices when using a site or to target advertising. First and third party cookies Whether a cookie is first or third party refers to the website or domain placing the cookie. First party cookies in basic terms are cookies set by a website visited by the user - the website displayed in the URL window. Third party cookies are cookies that are set by a domain other than the one being visited by the user. If a user visits a website and a separate company sets a cookie through that website this would be a third party cookie. 1
2 Does OpenLink Financial LLC use Cookies on its website, Yes. OpenLink Financial LLC uses first party cookies on the OpenLink Financial LLC Website. We tell you about our cookie use in our Privacy Policy found at policy.html How to remove cookies in Internet Explorer 8 1. Exit Internet Explorer 8, and then exit any instances of Windows Explorer. 2. Do one of the following: In Windows Vista or Windows 7, click the Start button, type inetcpl.cpl in the Start Search box, and then press ENTER. In Windows XP, click Start, click Run, type inetcpl.cpl in the Open box, and then press ENTER. 3. On the General tab, click Settings, and then click View Files. 4. Select the files (cookies) that you want to delete. 5. On the File menu, click Delete. How to remove cookies in FireFox3 1. Click on Tools, then Options 2. Select Privacy 3. Do one of the following: a. If your Firefox will setting is configured to Remember History, click the remove individual cookies link. b. If your Firefox will setting is configured to Use custom settings for history, click the Show Cookies button. 4. Select the cookie entry in the list and click on the Remove Cookie button How to remove cookies in Chrome 1. Click the wrench icon on the browser toolbar. 2. Select Options (Preferences on Mac and Linux; Settings on Chrome OS). 3. Click the Under the Hood tab. 4. Click Content settings in the "Privacy/Cookies" section. 5. Click the All Cookies and site data button 6. Select the files (cookies) that you want to delete. 7. Click the X to the right of the cookie name. How to remove cookies in Safari 1. Click the Action menu icon 2. Select Preferences 3. Select the Security tab 4. Click the Show Cookies button 5. Select the files (cookies) that you want to delete. 6. Click the Remove button 2
3 What is the EU Cookie Law? The Privacy and Communications (EC Directive)(Amendment) Regulations 2011 (UK Regulations) was recently amended on May 26, 2011 and the relevant rules are found in amended regulation 6, which reads as follows: 6. (1) Subject to paragraph (4), a person shall not store or gain information, or to gain access to information stored, in the terminal equipment of a subscriber or user unless the requirements of paragraph (2) are met. (2) The requirements are that the subscriber or user of that terminal equipment - (a) is provided with clear and comprehensive information about the purposes of the storage of, or access to, that information; and (b) has given his or her consent. (3) Where an electronic communications network is used by the same person to store or access information in the terminal equipment of a subscriber or user on more than one occasion, it is sufficient for the purposes of this regulation that the requirements of paragraph (2) are met in respect of the initial use. (3A) For the purposes of paragraph (2), consent may be signified by a subscriber who amends or sets controls on the internet browser which the subscriber uses or by using another application or program to signify consent. (4) Paragraph (1) shall not apply to the technical storage of, or access to, information - (a) for the sole purpose of carrying out the transmission of a communication over an electronic communications network; or (b) where such storage or access is strictly necessary for the provision of an information society service requested by the subscriber or user. Note that the previous rule on using cookies for storing information required a site to: tell people how the site used cookies; and tell them how they could opt out if they object. Many websites did this by putting information about cookies in their privacy policies and giving people the possibility of opting out. The new requirement is essentially that cookies can only be placed on machines where the user or subscriber has given their prior consent. When does the EU Cookie Law go into effect? The new regulation went into effect on May 26, Organizations need to take action to comply by no later than May 26, What is consent? As per Section 5 of the Information Commissioner s Office s Guidance (located at on the rules on use of cookies and similar technologies, consent is defined as any freely given specific informed indication of a user s wishes by which the 3
4 data subject signifies their agreement to personal data relating to the user being processed. There must be a form of communication where the user knowingly indicates consent/acceptance. This may involve clicking on an icon, sending an or subscribing to a service. The crucial consideration is that the user must fully understand that by the action in question, they will be giving their consent. Implied consent: The level of consent required for any activity has to take into account the degree of understanding and awareness the person being asked to agree has about what they are consenting to. A reliance on implied consent in any context must be based on a definite shared understanding of what is going to happen in this situation a user has a full understanding of the fact cookies will be set, is clear about what cookies do and signifies their agreement. At present evidence demonstrates that general awareness of the functions and uses of cookies is simply not high enough for websites to look to rely entirely in the first instance on implied consent. As consumer awareness increases over the next few years it may well be easier for organizations to rely on that shared understanding to a greater degree. This shared understanding is more likely to be achieved quickly if websites make a real effort to ensure information about cookies is made clearly available to their users, for example, displaying a prominent link to More information about how our website works and cookies at the top of the page rather than through a privacy policy in the small print. Consent from the user or subscriber: The Regulations state that consent for a cookie should be obtained from the subscriber or user. The subscriber means the person who pays the bill for the use of the line. The user is the person using the computer or other device to access a website. In practice the owner of a website may well not be able to distinguish between consent provided by the subscriber or the user. The key then is that valid consent has been provided by one of the parties. The Regulations do not specify whose wishes should take precedence if they are different. Other references in the legislation to a subscriber s ability to make decisions in this area, such as around browser settings, might suggest the subscriber s indications may in the first instance take priority. There may well be cases where a subscriber, for example, an employer, provides an employee with a terminal at work along with access to certain services to carry out a particular task, where to effectively complete the task depends on using a cookie type device. In these cases, it would not seem unreasonable for the employer s wishes to take precedence. There are other areas of the legislation, around browser settings where the subscriber clearly has the ability to make a decision on behalf of any users. However, there will be circumstances where a user s wish should take precedence. To continue the above example, an employer s wish to accept such a device should not take precedence where this will involve the unwarranted collection of personal data of that employee. 4
5 Does the consent rule apply to every type of cookie? According to All About Cookies (located at concerns/new- european- laws.html), which acts as a free Cookie resource providing the latest information in response to the Information Commissioners Office press issue, the only exception to EU Cookie Law is if what you are doing is strictly necessary for a service requested by the user. This exception needs to be interpreted quite narrowly because the use of the phrase strictly necessary means its application has to be limited to a small range of activities and because your use of the cookie must be related to the service requested by the user. Indeed, the relevant recital in the Directive on which these Regulations are based refers to services explicitly requested by the user. As a result our interpretation of this exception therefore has to bear in mind the narrowing effect of the word explicitly. The exception would not apply, for example, just because you have decided that your website is more attractive if you remember users preferences or if you decide to use a cookie to collect statistical information about the use of your website. 5
Optimal Browser Settings for Internet Explorer Running on Microsoft Windows
Optimal Browser Settings for Internet Explorer Running on Microsoft Windows If you have Internet Explorer 7 or 8: Each time you log in to our web site, it evaluates whether you are using the same computer
Lifesize Cloud Privacy Statement
Lifesize Cloud Privacy Statement When you use Lifesize Cloud, you provide certain information to Lifesize, Inc. and its affiliates, successors and assigns (collectively referred to as Lifesize ), including
Workstation Certification Tool Frequently Asked Questions
Workstation Certification Tool Frequently Asked Questions Workstation Certification Tool 1. What does the Workstation Certification Utility do? 2. How do I certify computers using the Workstation Certification
Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app
Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly
Clearing Browser Cache/History
Clearing Browser Cache/History A number of concerns in RamCT can usually be resolved by clearing the Browser Cache on your local computer. The browsers that are supported with RamCT are Internet Explorer,
Adaptive Business Management Systems Privacy Policy
Adaptive Business Management Systems Privacy Policy Updated policy: Effective on July 01, 2013 This privacy statement describes how Adaptive Business Management Systems collects and uses the personal information
The UC Learning Center: Disabling Pop-Up Blockers
The UC Learning Center: Disabling Pop-Up Blockers In order to launch online courses within the UC Learning Center all pop-up blockers must be turned off. This guide will walk you through disabling pop-up
Privacy and Electronic Communications Regulations. Guidance on the rules on use of cookies and similar technologies
Privacy and Electronic Communications Regulations Guidance on the rules on use of cookies and similar technologies Contents 1. Introduction 2. Background 3. Consumer awareness of cookies 4. Terminology
1. TURN OFF UAC SETTINGS
AKOYA INSTALLATION TECHNICAL REQUIREMENTS INTERNET EXPLORER CONFIGURATION FOR AKOYA.NET 1. TURN OFF UAC SETTINGS Before making the following changes in Internet Explorer, you must be a local administrator
Browser Settings for Optimal Site Performance
1 Browser Settings for Optimal Site Performance With the constant upgrades to browsers and to City National s systems, an occasional problem may develop with your browser and our program compatibility.
FAQ - Online Applications - Payment and Submission
FAQ - Online Applications - Payment and Submission Please see the list below for answers to frequently asked questions regarding payment and submission on our online application system: How much does a
Opinion 04/2012 on Cookie Consent Exemption
ARTICLE 29 DATA PROTECTION WORKING PARTY 00879/12/EN WP 194 Opinion 04/2012 on Cookie Consent Exemption Adopted on 7 June 2012 This Working Party was set up under Article 29 of Directive 95/46/EC. It is
1. Right click using your mouse on the desktop and select New Shortcut.
offers 3 login page styles: Standard Login, List Login or Quick Time Punch. Each login page can be saved as a shortcut to your desktop or as a bookmark for easy fast login access. For quicker access to
How we use cookies on our website
How we use cookies on our website We use cookies on our site to improve performance and enhance your user experience. This policy explains how cookies work. What are cookies? Cookies are small text files
Using Rackspace Webmail
Using Rackspace Webmail Contents 1. Logging into Rackspace Webmail... 1 2. Add/Change your Signature... 2 3. Configure audible notifications... 5 4. Manage Auto-Reply ( Out of Office /Vacation responder)...
ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012
ESOMAR PRACTICAL GUIDE ON COOKIES JULY 2012 Copyright ESOMAR 2012 TABLE OF CONTENTS 2 Objectives 2 Introduction 3 Definitions 4 SECTION 1: APPLICABLE LAW 4 SECTION 2: WHAT YOU NEED TO KNOW SOME FAQs 5
UNIT ASSESSMENT SYSTEM DOCUMENTATION FACULTY
UNIT ASSESSMENT SYSTEM DOCUMENTATION FACULTY November 2013 The purpose of UAS is to collect and measure assessment data for select courses. 1 Accessing the Unit Assessment System Application 2 Browser
Leonardo Hotels Group Page 1
Privacy Policy The Leonardo Hotels Group, represented by Sunflower Management GmbH & Co.KG, respects the right to privacy of every individual who access and navigate our website. Leonardo Hotels takes
A guide to affilinet s tracking technology
A guide to affilinet s tracking technology Content Introduction 1 What s covered in this Paper? 1 1. Why does affilinet use cookies? 1 Figure 1 the Commercial Model for Performance Marketing 1 2. How does
New Online Banking Guide for FIRST time Login
New Online Banking Guide for FIRST time Login Step 1: Login Enter your existing Online Banking User ID and Password. Click Log-In. Step 2: Accepting terms and Conditions to Proceed Click on See the terms
SKoolAide Privacy Policy
SKoolAide Privacy Policy Welcome to SKoolAide. SKoolAide, LLC offers online education related services and applications that allow users to share content on the Web more easily. In addition to the sharing
Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...
Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...
PC Troubleshooting Steps
PC Troubleshooting Steps This FAQ is designed to help PC users to go through various troubleshooting steps to allow them to view the FerrisConnect Learn/Vista sites appropriately. Compatible Browsers Check
Guidelines on Executive Order on Information and Consent Required in Case of Storing and Accessing Information in End-User Terminal Equipment
Guidelines on Executive Order on Information and Consent Required in Case of Storing and Accessing Information in End-User Terminal Equipment ("Cookie Order") 2nd version, April 2013 Preface...3 1. Introduction...5
Akita International University Online Application System. Usage Manual
Akita International University Online Application System Usage Manual Please Check the Following Before You Begin To Access the System: Ensure you are using one of the following Operating Systems (OS)
PRIVACY POLICY. "Personal Information" comprising:
PRIVACY POLICY Uniqlo is committed to respecting the privacy rights of visitors to its website. This privacy policy ("Policy") explains how we collect, store and use personal data about you when you browse
Instructions to Sign On and Off of Self Service Applications. Internet Explorer 9 (IE9) Users: Turn Off Compatibility View:
Instructions to Sign On and Off of Self Service Applications NOTE: Internet Explorer 7 and 8 are the only supported Browsers for the PeopleSoft Student Self Service applications. If you experience technical
A Guide to using egas Lead Applicant
A Guide to using egas Lead Applicant egas Browsers and Browser Settings Logging In Passwords Navigation Principles Your Contact Details Tasks Overview Completing Tasks egas The Health and Care Research
Why do I have to log in as a Current UM Employee?
UMSL Application faqs How do I apply for an open position? To begin the application process, click on this link and read the instructions. Then click on the link at the bottom which will then take you
Web24 Supported Software
Web24 Supported Software Browser & OS Requirements Connectivity, hardware and browser support are critical to providing the best user experience within Web24. We work hard to make sure that Web24 renders
User Support Resource
User Support Resource Clearing Browser Cache To optimize your experience in the MyUNLV system, it may be necessary to clear your browser cache. While it is not necessary to clear you cache every time you
KUB Website Troubleshooting
KUB Website Troubleshooting Are you having problems getting to the KUB website at http://www.kub.org/? If you type in your user ID and password and press the login button, are you routed right back to
VPN Web Portal Usage Guide
VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET
Infor Xtreme Browser References
Infor Xtreme Browser References This document describes the list of supported browsers, browser recommendations and known issues. Contents Infor Xtreme Browser References... 1 Browsers Supported... 2 Browser
Frequently Asked Questions for logging in to Online Banking
Frequently Asked Questions for logging in to Online Banking Why don t I recognize any of the phone numbers on the Secure Code page? I can t remember my password; can I reset it myself? I know I have the
Trusted Relationships. Sending Invitations. Sending Invitations from Outlook
Trusted Relationships Establishing Trusted Relationships through the invitation process are core to the Securencrypt security process. This insures that you can only share secure documents with someone
User guide. Business Email
User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook
2010 Outlook Web App Client Overview
2010 Outlook Web App Client Overview The upgrade to Microsoft Exchange 2010 includes an updated web-based e-mail client, OWA. OWA stands for Outlook Web App and gives you access to your district e-mail
Verified Volunteers. System User Guide 10/2014. For assistance while navigating through the system, please contact Client Services at:
Verified Volunteers System User Guide 10/2014 For assistance while navigating through the system, please contact Client Services at: [email protected] - (855) 326-1860 - Option 1 Welcome to Verified
How to Enable TLS 1.0 in the Browser. Directions on enabling this security feature in your Internet Browser
How to Enable TLS 1.0 in the Browser Directions on enabling this security feature in your Prepared By: Ben Varghese, Systems Response Citrix Team Page 1 of 7 Table of Contents 1. INTRODUCTION... 3 2. CONFIGURATION
PC Requirements and Technical Help. Q1. How do I clear the browser s cache?
Q1. How do I clear the browser s cache? A1. Clear your browser's cache, and close all other applications that are running in your PC to free up memory space. For instructions on clearing cache (temporary
Installing a Browser Security Certificate for PowerChute Business Edition Agent
Installing a Browser Security Certificate for PowerChute Business Edition Agent The Agent component of PowerChute Business Edition has a "self-signed" security certificate. This means that when you access
Office of Information Technology Connecting to Microsoft Exchange User Guide
OVERVIEW The Office of Information Technology is migrating its messaging infrastructure from Microsoft Exchange 2003 to Microsoft Exchange 2010. Moving to the latest technology will provide many enhancements
MyReports Recommended Browser Settings MYR-200a
MyReports Recommended Browser Settings MYR-200a Note: If you have installed an additional Tool Bar on your browser, such as Yahoo Tool Bar or Google Tool Bar, be sure that it is also configured to allow
Problem: Logging on to UT Southwestern Student Center
FAQ UT Southwestern Student Center Page 1 If you are experiencing problems logging into the site or accessing a data link, please try the remedies listed here first. Most problems can be quickly resolved
Reference Guide for WebCDM Application 2013 CEICData. All rights reserved.
Reference Guide for WebCDM Application 2013 CEICData. All rights reserved. Version 1.2 Created On February 5, 2007 Last Modified August 27, 2013 Table of Contents 1 SUPPORTED BROWSERS... 3 1.1 INTERNET
isupplygw Site Login Troubleshooting
Site Login Troubleshooting Tips User name is administrator s email address Password requirements: o Passwords must be at least 8 characters long and can be as long as 30 characters. o Passwords must contain
BROWSER SETTINGS- TROUBLESHOOTING GUIDE. Internet Explorer. Firefox. Safari. Google Chrome. 1 Browser Settings- troubleshooting Guide Back to top
BROWSER SETTINGS- TROUBLESHOOTING GUIDE Internet Explorer Firefox Safari Google Chrome 1 Browser Settings- troubleshooting Guide Back to top INTERNET EXPLORER IE- Tools>Internet Options GENERAL TAB *Delete
Help. F-Secure Online Backup
Help F-Secure Online Backup F-Secure Online Backup Help... 3 Introduction... 3 What is F-Secure Online Backup?... 3 How does the program work?... 3 Using the service for the first time... 3 Activating
Instructions on registering in the Portal
Instructions on registering in the Portal Aim To use the DAAD Portal and, for example, submit an application, you have to register first. You only have to register once, and in doing so you make yourself
Using Avaya Aura Messaging Web Access
Using Avaya Aura Messaging Web Access Release 6.3.2 Issue 1 December 2014 Contents Chapter 1: Getting started... 5 Avaya Aura Messaging Web Access... 5 Requirements... 5 Logging in to Messaging Web Access...
Configuring Internet Explorer for CareLogic
Configuring Internet Explorer for CareLogic March 19, 2014 1 P a g e Table of Contents Configuring Internet Explorer for CareLogic... 3 Configuring Internet Explorer Security Settings... 4 Internet Explorer
Secure Message Center User Guide
Secure Message Center User Guide Using the Department of Banking Secure Email Message Center 2 Receiving and Replying to Messages 3 Initiating New Messages 7 Using the Address Book 9 Managing Your Account
Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook
Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For
dma How to guide Email and cookies legislation Published by The DMA Email Marketing Council and the IAB Email Marketing Council we are the
dma we are the How to guide Email and cookies legislation Published by The DMA Email Marketing Council and the IAB Email Marketing Council First edition, April 2012 Contents Acknowledgements...2 Introduction...3
the barricademx end user interface documentation for barricademx users
the barricademx end user interface documentation for barricademx users BarricadeMX Plus The End User Interface This short document will show you how to use the end user web interface for the BarricadeMX
Maple T.A. Beginner's Guide for Instructors
Maple T.A. Beginner's Guide for Instructors Copyright Maplesoft, a division of Waterloo Maple Inc. 2013 Maple T.A. Beginner's Guide for Instructors Contents Preface... v 1 Maple T.A. Quick Start for Instructors...
Portal Recipient Guide
Portal Recipient Guide Lindenhouse Software Limited 2015 Contents 1 Introduction... 4 2 Account Activation... 4 3 Forgotten Password... 9 4 Document signing... 12 5 Authenticating your Device & Browser...
Accessing Restricted University Online Resources Using Network Connect. on the Secure Remote Access Service
Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Accessing Restricted University Online Resources Using Network Connect Table of Contents Overview... 1 Connecting to the Secure Remote
WHAT INFORMATION IS COLLECTED AT MOTOROLA.COM.VN AND/OR MOTOROLA.VN AND HOW IS IT PROCESSED AND USED?
MOTOROLA PRIVACY POLICY This Privacy Statement ( Policy ) is subject to change at Motorola s discretion. If we decide to change this Policy, we will post the amended Policy on this website so you will
BROWSER TIPS FOR PEOPLESOFT
BROWSER TIPS FOR PEOPLESOFT Please note: This document is designed to be used online and has a number of embedded links to processes and additional information. We discourage the printing of these documents
C O N F I G U R I N G Y O U R W E B B R O W S E R TO A L L O W P O P - U P W I N D O W S
C O N F I G U R I N G Y O U R W E B B R O W S E R TO A L L O W P O P - U P W I N D O W S Most web browsers include a feature to block pop-up windows. While this may eliminate unwanted or bothersome pop-up
FreeAgent DockStar Network Adapter User Guide
FreeAgent DockStar Network Adapter User Guide FreeAgent DockStar Network Adapter User Guide 2010 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are
RingCentral for Google. User Guide
RingCentral for Google User Guide RingCentral for Google User Guide Contents 2 Contents Introduction............................................................... 4 About RingCentral for Google..........................................................
TJHSST Zeus Database Proxy Handbook
TJHSST Zeus Database Proxy Handbook Revision 2.1 (October 10, 2014) Andrew Hamilton Network / Systems Administrator TJHSST IT Team [email protected] October 10, 2014 Contents 1 Internet Explorer 9 on
Enabling pop-up windows on different browsers
Enabling pop-up windows on different browsers A pop-up window is a small web browser window that appears on the website you're viewing. This window opens for an application to display new information.
Download and Launch Instructions for WLC Client App Program
Download and Launch Instructions for WLC Client App Program Version 1.0 Contents Introduction... 1 Windows 7, IE9... 2 Windows 7 or XP, IE8... 3 Windows 7 or XP, Firefox... 4 Windows 7, Google Chrome...
Subscribe to RSS in Outlook 2007. Find RSS Feeds. Exchange Outlook 2007 How To s / RSS Feeds 1of 7
Exchange Outlook 007 How To s / RSS Feeds of 7 RSS (Really Simple Syndication) is a method of publishing and distributing content on the Web. When you subscribe to an RSS feed also known as a news feed
Dartmouth College Technical Support Document for Kronos PC version
Dartmouth College Technical Support Document for Kronos PC version Contents How to Save the Kronos URL as a Favorite or Bookmark... 2 Internet Explorer... 2 Firefox... 4 Possible Problems When Logging
SmartGrant Web Browser Set-Up
SmartGrant Web Browser Set-Up TABLE OF CONTENTS SmartGrant Supported Web Browsers for Windows... 2 Configuring Your Web Browser for SmartGrant... 3 Internet Explorer... 3 Firefox... 10 Chrome... 15 Safari...
VMware Horizon FLEX User Guide
Horizon FLEX 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Shentel (Shentel.net)
Shentel (Shentel.net) Email Quick Start Guide Your new webmail is now powered by Contents If you are forwarding your Shentel.net email to a third party address...2 If you use an email program other than
Qvidian Playbooks & Salesforce Setup Guide. Fall Release 2013
Qvidian Playbooks & Salesforce Setup Guide Fall Release 2013 Last Updated: 11/12/2013 Introduction Welcome to Qvidian Sales Playbooks & Analytics! This guide is directed toward CRM Administrators, Playbook
8x8 Virtual Office Telephony Interface for Salesforce
8x8 Virtual Office Telephony Interface for Salesforce Administrator Guide May 2014 The Champion For Business Communications Table of Contents 8x8 Virtual Office Telephony Interface for Salesforce.... 3
Labour Market Programs Support System. LaMPSS Computer Compatibility Guide
Labour Market Programs Support System LaMPSS Computer Compatibility Guide Prepared by: LaMPSS Operations Support June 2012 Version: 1.1 2011 Nova Scotia Department of Labour and Advanced Education This
Instructions for use the VPN at the Warsaw School of Economics
Instructions for use the VPN at the Warsaw School of Economics Dariusz Jaruga. ver. 1.1 (19-01-2011) Introduction VPN is the abbreviation for Virtual Personal Network which allows you to connect your computer
VMware Horizon FLEX User Guide
Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
The Commerce Trust Company
The Commerce Trust Company WEALTH MANAGER Overview Guide New Page Layout The pages within Wealth Manager have been designed to provide a consistent experience throughout a vast array of features. Each
Website Administration Security Guide
Website Administration Security Guide September 2012 TABLE OF CONTENTS Introduction... 1 General Overview... 1 System Requirements... 1 Important Administrator Terms... 2 Security Services Administration...
The cloud server setup program installs the cloud server application, Apache Tomcat, Java Runtime Environment, and PostgreSQL.
GO-Global Cloud 4.1 QUICK START SETTING UP A WINDOWS CLOUD SERVER AND HOST This guide provides instructions for setting up a cloud server and configuring a host so it can be accessed from the cloud server.
Quick Start Guide to Logging in to Online Banking
Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s
isupplier PORTAL ACCESS SYSTEM REQUIREMENTS
TABLE OF CONTENTS Recommended Browsers for isupplier Portal Recommended Microsoft Internet Explorer Browser Settings (MSIE) Recommended Firefox Browser Settings Recommended Safari Browser Settings SYSTEM
Symantec Enterprise Vault
Symantec Enterprise Vault Guide for Mac OS X Users 10.0 Symantec Enterprise Vault: Guide for Mac OS X Users The software described in this book is furnished under a license agreement and may be used only
Privacy Policy Last Updated September 10, 2015
Privacy Policy Last Updated September 10, 2015 Tanger Properties Limited Partnership d/b/a Tanger Outlets or Tanger Outlet Centers ("Tanger," "we" or us ), which includes affiliated companies owned or
Working with your NTU email off campus
Working with your NTU email off campus When you are working on a laptop or at home you can access your email via a number of methods. Using Outlook Web Access or NOW, you can access your email via any
MAXA-COOKIE-MANAGER - USER MANUAL - SW-Release V 5.0 / Document Rev. 1.1
MAXA-COOKIE-MANAGER - USER MANUAL - SW-Release V 5.0 / Document Rev. 1.1 Quick Start Once installed MAXA Cookie Manager goes to work immediately to gather information about the cookies on your system and
How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro
Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing
How to create a dialup connection to an S8X00 Media Server
How to create a dialup connection to an S8X00 Media Server Useful when customers wants to dial into their S8X00 server, however unlikely that situation is. Typically, customers will be able to access their
Microsoft Outlook Web Access Handbook
Microsoft Outlook Web Access Handbook Introduction Outlook Web access allows you to use a web browser (Internet Explorer or Firefox) to read your email, send email, and check your online calendar. This
Jive Connects for Openfire
Jive Connects for Openfire Contents Jive Connects for Openfire...2 System Requirements... 2 Setting Up Openfire Integration... 2 Configuring Openfire Integration...2 Viewing the Openfire Admin Console...3
Frequently Asked Questions Ag Banking Online
Table of Contents Note: To quickly navigate to the answer, click on the question. What is Multi-Factor Authentication (MFA) and its purpose?... 2 This is my first time accessing the online application.
CITRIX TROUBLESHOOTING TIPS
CITRIX TROUBLESHOOTING TIPS The purpose of this document is to outline the Most Common Frequently Asked Questions regarding access to the County of York Computer Systems via Citrix. SYSTEM REQUIREMENTS:
Change Advanced Proxy Server Configuration Settings
Change Advanced Proxy Server Trigger Business Process Procedure Overview This project will show you how to change Configuration settings on the Advanced tab. This section is used to enter information about
2X Cloud Portal v10.5
2X Cloud Portal v10.5 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
