Pennsylvania Department of Public Welfare. Bureau of Information Systems OBSOLETE. Secure User Guide. Version 1.0.

Size: px
Start display at page:

Download "Pennsylvania Department of Public Welfare. Bureau of Information Systems OBSOLETE. Secure E-Mail User Guide. Version 1.0."

Transcription

1 Pennsylvania Department of Public Welfare Bureau of Information Systems Secure User Guide Version 1.0 August 30, 2006

2 Table of Contents Introduction... 3 Purpose... 3 Terms of Use Applicable to this Site... 5 Legal Privacy Statement... 5 Login Information... 6 Reply To A Secure Reply To A Message Create A New Secure Message Attachments To A Secure Message Viewing Sent Messages Mail Preferences Delete A Message From The In-Box Other Purge Policy: Backup of user secure and attachments: Transferring documents out-of secure environment Auto Forward Policy Related Documents Document Change Log Page 2 of 38

3 Secure User Guide Introduction HIPAA regulations mandated the use of necessary safeguards to protect ephi with an April 2005 deadline for implementation. In addition, interpretation of IRS regulations could imply regulatory compulsion for communications concerning financial transactions. In the past communication between DPW personnel and Business Partners transpired across the Internet in clear text. Program offices had chosen to implement policies not to use e- mail as a medium to communicate client data based upon this limitation. Internal (DPW employee to employee) provides no encryption as it traverses the protected Commonwealth private network. This is not as vulnerable as the communication with Business Partners over the Internet Purpose emediary provides a secure solution to DPW employees, Business Partners, and clientele of DPW with the need to protect PHI (Protected Health Information), financial information and other sensitive information. emediary is a COTS (Commercial off the Shelf) secure staging server solution to provide a means for secure communications with DPW (Department of Public Welfare) Business Partners and clientele using . This will address the following business requirements Benefits: Compliance with HIPAA regulations: Compliance with HIPAA Privacy Rule 45 CFR Part 160 & 164 Compliance with the Final HIPAA Security Rule 45 CFR and (c) assuring the confidentiality, integrity, and availability of electronic PHI (Protected Health information) during transmission Compliance with IRS regulations. Page 3 of 38

4 In addition to satisfying security and privacy requirements, DPW required the following of a secure solution: attachment capabilities redirection capabilities Integration with DPW s Unified Security initiative Regulatory Compliance Compliance with HIPAA Privacy Rule 45 CFR Part 160 & 164, which states reasonable technical safeguards and the minimum necessary, standards for electronic must be implemented for the privacy of Electronic Protected Health Information (ephi), specifically as it relates to Business Associates and the transmission of ephi between covered DPW agencies (OMAP, OMR, OIM, OCYF) and designated Business Partners CFR (e), CFR (e). To meet HIPAA s security and privacy requirements, a secure system must have: Authorization: Role-based authorizations (access controls) confidentiality (encryption) and nonrepudiation (digital signatures) Authentication: The assurance of a user s identity, accomplished by the use of a unique identifier (e.g. password, biometric identifier, smart card) Audit Trail: A record of all activities occurring in the system, providing a chain of trust Secure Data Storage and Transmission: Data security must be maintained during electronic document transmission, with encryption being the likely solution Integrity Information must be accurate, consistent, and complete Section , the statement of the general Rule, requires covered entities to: Ensure the confidentiality, integrity and availability of all electronic protected health information (ephi) the covered entity creates, receives, or transmits Protect against any reasonably anticipated threats or hazards to the security or integrity of such information Protect against any reasonably anticipated uses or disclosures of such information that are not permitted or required by the Privacy Rule Ensure compliance by its workforce Technical Safeguards Section , Technical Safeguards, contains provisions extracted from two sections of the rule: Covered entities must implement: Technical policies and procedures were created for access control on systems that maintain ephi. These systems must allow for unique user identification and include an emergency access procedure for obtaining necessary EPHI during an emergency. Page 4 of 38

5 Addressable specifications include automatic log-off and encryption/decryption, which is defined as a mechanism to encrypt and decrypt ephi. Transmission Security Hardware security, software security, and procedural methods for providing audit controls Policies and Procedures to protect EPHI from improper alteration or destruction to ensure data integrity Person or entity authentication, which requires the covered entity to implement procedure that verify that a person or entity seeking access to EPHI is the one claimed to be doing so. Compliance with the Final HIPAA Security Rule 45 CFR and (c) assuring the confidentiality, integrity, and availability of electronic PHI during transmission over a communications network. Security of ephi sent via to outside Business Partners and non-dpw covered entities is essential to comply with the new regulations. Terms of Use Applicable to this Site This mail system is provided by the Commonwealth of Pennsylvania, Department of Public Welfare for use by authorized DPW staff and authorized Commonwealth Business partners when the transfer of confidential information is required. You are responsible for ensuring that your password and username are kept confidential and you hereby agree that you will not disclose your password or username to others. Use of this site implies that you agree to take precautions, comply with practices, and implement procedures as outlined in our privacy statement. Legal Privacy Statement You, the recipient or sender of any confidential information are obligated to maintain it in a safe, secure and confidential manner. Unauthorized redisclosure or failure to maintain confidentiality subjects you to application of appropriate sanctions. Healthcare information is personal and sensitive and must be treated accordingly. Any document that contains information covered under the Privacy Act and/or the Health Insurance Portability and Accountability Act and its various implementing regulations and must be protected in accordance with those provisions. Any correspondence that contains healthcare information provided to or from you after appropriate authorization from the patient or under circumstances that don't require patient authorization must also be protected. Redisclosure without additional patient consent is prohibited unless otherwise permitted by law. Page 5 of 38

6 Login Information Login using your CWOPA or Business Partner Login and Password. This User Guide is intended to be a set of quick start instructions to use with some of the basic features of the emediary Secure product. Each screen contains instructions on how to perform the operation related to that particular screen. In many respects it has a similar feel to other products with which you might be familiar. When viewing a particular screen, you are encouraged to follow the instructions and on - screen help that is displayed with the function that you wish to perform. Page 6 of 38

7 Reply To A Secure Users who have received authorization to use secure will receive notification via their regular employee box (Microsoft Outlook, Netscape, GOOGLE) that they have a secure . This notification will contain a link that will permit the user to access the secure . Do not attempt to reply from the Inbox, you must open the message before replying to sender. You will receive an error message from our mail system if you do attempt to reply from the inbox screen. Page 7 of 38

8 Accessing the link will take the user to the following screen: Everyone must pass thru the Department s Unified Security System before sending or receiving a secure message. If you have problem logging into this system, please contact your Program Office Coordinator for assistance. Page 8 of 38

9 DPW Business partners will then see the screen below reminding them of the terms and conditions under which this messaging system is provided to them. Business partners should read and understand this agreement statement. Failure to click on ACCEPT will result in the user not proceeding past this point. Proceed to the next page. This is the emediary login (Home) screen. Select the emediary tab. Page 9 of 38

10 Please read the Terms of use applicable to this site. These are the terms of agreement that you agree to when you use this secure application. This is the mail notification screen. Select the message to read as you would using any other product. Page 10 of 38

11 Please read the Legal privacy statement. These are the terms of agreement that you agree to when you use this secure system. Page 11 of 38

12 This is an example of the type of screen that you will see upon accessing the mail notification screen. Note the area in which you view the message. To reply to Rich Sage s . Double Click, with the mouse, on the subject Test. ** Note the PURGE Message (RED) at the bottow of the screen (See Purge documents in this document) Page 12 of 38

13 Select the Reply button. Page 13 of 38

14 Reply To A Message Read the two lines of instruction directly below the Reply To Message highlight. Page 14 of 38

15 Read the two lines of instruction directly below the Reply To Message highlight. Add additional recipients and then select Verify Recipients. This is the reply as it would be entered. Insert an additional message. Page 15 of 38

16 When you have finished your reply, select the Send button. Confirmation that your secure has been sent. Page 16 of 38

17 Page 17 of 38

18 Create A New Secure Message Click on New Message Page 18 of 38

19 You will be taken to this screen to enter the name of the person to whom you wish to send an e- mail. There are two ways to enter an address. If you know the address you may type it in the To line. You need only type in the prefix of the address. Do not example: rsage would be typed in at the To line, instead of For a CWOPA account use the To or Cc for CWOPA Users. For a PACSES or PWMUser account use only the To for Business Partners. Note: Attempting to use an invalid user-id will return an error message. Example: Type in John Miknacks (CWOPA) address: jmiknack You may use the Directory option to find the person to whom you wish to send an select the Directory button. Page 19 of 38

20 Enter the search criteria as shown below. Select the environment to search in (CWOPA). Enter last name and then first name (must be correct spelling). If your not sure of the spelling use wildcard character (*). You may select the To or CC options to have the name inserted into your new message. Page 20 of 38

21 Directory searches of CWOPA or Business Partners will return all users registered in our Unified Security System. Not all users registered in our Unified Security System have been registered to use emediary messaging. Attempting to send a message to an unregistered emediary user will result in a error message. The procedure for registering users may be obtained from your Program Office Coordinator. Before selecting OK and closing this activity, you may add this address to you re My Directory mail box s, your personal directory, by selecting the ADD button on the right. The My Directory address book will contain your favorite recipients. Note: some common first and last names may return multiple users when performing a search. If the list of users exceeds fifteen (15) an error will be displayed indicating that the list is too large to display. To correct an error from to many users returned after the search use wild card character *. Examples: R*, Sa* You are returned to the Create A New Message screen and the address is placed into the To line of the message. Select Verify Recipients to complete the To line. Page 21 of 38

22 At this point you may compose the . Page 22 of 38

23 After completing the message you may: 1. Send this message. Page 23 of 38

24 2. or add an attachment to this message After sending a message, verification that your message has been sent will be displayed: Page 24 of 38

25 Page 25 of 38

26 Attachments To A Secure Message To attach a file, select the Attach Files button. Use the Attach Files feature to search for the file you wish to attach. Page 26 of 38

27 Use the Browse feature to search for the file you wish to attach. Most of the same file types that cannot be sent as attachments in the Commonwealth Mail System are also blocked from being sent through this system. Examples of file types being blocked are: exe, vbs, bat, com..etc. Page 27 of 38

28 As stated on the screen print below, the total of all attachments may not exceed 5mb. After you have found the file you wish to attach, select Attach. Your file will be attached and the document is ready to send. Select Done and continue. Note: If the intent of the message is to send an attached document, YOU MUST INSERT TEXT INTO THE MESSAGE AREA OF THE SCREEN. Example: Document attached per your request. Document attached for your information. Page 28 of 38

29 Your file is attached and the document is ready to send. Clicking on one of the above SEND buttons will result in the message being sent. Page 29 of 38

30 Viewing Sent Messages Select the Sent Messages feature to view all sent messages. Page 30 of 38

31 ** Note the PURGE Message (RED) at the bottom of the screen (See Purge documents in this document) Mail Preferences The Mail Preferences Screen permits users to change certain features of the system to suit your particular needs and taste. Most use should not need to change mail preference settings. Page 31 of 38

32 **Note: It is against DPW policy to use the Auto Forwarding preference at this time. This feature should be set to NO. Turning this option ON could result in HIPAA related information being forwarded to someone that was not intended to view the information. Delete A Message From The In-Box Page 32 of 38

33 To delete a message from the in-box click on the delete box next to all of the messages to be deleted and press ENTER. Then confirm the delete by selecting delete on the next screen. OR Open the message. View the contents of the to verify this is the correct one to be deleted. Page 33 of 38

34 Select the Delete option. Page 34 of 38

35 Select either of the Delete options shown above. The message has been deleted. Page 35 of 38

36 Page 36 of 38

37 Other - Purge Policy: All documents for all users will be purged/deleted, (automated system purge) from all user s secure mailboxes every 90 days. Purge is based on the date the was sent (sent box) or received (Inbox). This is a daily purge based on that is older than 90 days. Backup of user secure and attachments: At this time, no secure messages or attachments will be backed up. Transferring documents out-of secure environment Messages being cut and pasted from the secure environment to the desktop and/or hard drive, on the local machine, need to be secured per your local HIPAA policies. These local HIPAA policies are based on federal policies. Local policies should include file and folder security. Attachments being saved from the secure environment to the desktop and/or hard drive, on the local machine, need to be secured per your local HIPAA policies. These local HIPAA policies are based on federal policies. Local policies should include file and folder security. Auto Forward Policy The Auto Forward Policy above should not to be used by any user of this secure application. It is our belief that this could result in HIPAA related information being forwarded to someone that was not intended to view the information. Page 37 of 38

38 Related Documents - Secure Policy HIPAA Handbook HIPAA Privacy Bulletin HIPAA Training Presentation List of Program Office Coordinators & Their Responsibilities OA Management Directive on Retention and Disposition of Records Created on Electronic Mail ( ) Systems Document Change Log Change Date Version CR # Change Description Author and Organization 07/05/ Initial creation. RSage Page 38 of 38

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected

More information

HIPAA Information Security Overview

HIPAA Information Security Overview HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is

More information

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information

More information

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security

More information

CHIS, Inc. Privacy General Guidelines

CHIS, Inc. Privacy General Guidelines CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified

More information

Outlook Web Access. PRECEDED by v\

Outlook Web Access. PRECEDED by v\ Outlook Web Access Logging in to OWA (Outlook Web Access) from Home 1. Login page http://mail.vernonct.org/exchange 2. To avoid these steps each time you login, you can add the login page to your favorites.

More information

Background Information

Background Information User Guide 1 Background Information ********************************Disclaimer******************************************** This is a government system intended for official use only. Using this system

More information

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Secure transmission of Protected Health Information (PHI)

Secure transmission of Protected Health Information (PHI) PHI Email Encryption Instructions for External Entities Page 1 of 5 Secure transmission of Protected Health Information (PHI) To ensure that all communications (email, phone, or fax) containing Protected

More information

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview IBM Internet Security Systems The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview Health Insurance Portability and Accountability Act

More information

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer Securing the FOSS VistA Stack HIPAA Baseline Discussion Jack L. Shaffer, Jr. Chief Operations Officer HIPAA as Baseline of security: To secure any stack which contains ephi (electonic Protected Health

More information

UC Irvine Health Secure Mail Message Center

UC Irvine Health Secure Mail Message Center UC Irvine Health Secure Mail Message Center UC Irvine Health is committed to protecting the privacy of its member s information, especially their protected health information (PHI). UC Irvine Health is

More information

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security

More information

Outlook Web Access (OWA) with Exchange Server 2007 (Windows version)

Outlook Web Access (OWA) with Exchange Server 2007 (Windows version) Outlook Web Access (OWA) with Exchange Server 2007 (Windows version) 1. Login into your Baylor email account via a web browser such as Internet Explorer, Fire Fox, or Netscape. The web URL is still http://mail.baylor.edu/

More information

Outlook Web Access Tipsheets

Outlook Web Access Tipsheets You can use a Web browser to access your Outlook mailbox from any computer with an Internet connection. You can use Outlook Web Access with Microsoft Internet Explorer, Mozilla Firefox and many other browsers.

More information

Secure Message Center User Guide

Secure Message Center User Guide Secure Message Center User Guide Using the Department of Banking Secure Email Message Center 2 Receiving and Replying to Messages 3 Initiating New Messages 7 Using the Address Book 9 Managing Your Account

More information

Healthcare Compliance Solutions

Healthcare Compliance Solutions Healthcare Compliance Solutions Let Protected Trust be your Safe Harbor In the Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH), the U.S. Department of Health and Human

More information

HIPAA Compliance Guide

HIPAA Compliance Guide HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care

More information

Secure Email Client Guide

Secure Email Client Guide PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing

More information

BCSD WebMail Documentation

BCSD WebMail Documentation BCSD WebMail Documentation Outlook Web Access is available to all BCSD account holders! Outlook Web Access provides Webbased access to your e-mail, your calendar, your contacts, and the global address

More information

HIPAA Privacy & Security White Paper

HIPAA Privacy & Security White Paper HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 sabrina@captureproof.com Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Using etoken for Securing E-mails Using Outlook and Outlook Express

Using etoken for Securing E-mails Using Outlook and Outlook Express Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered

More information

SEC External Guide for Using Accellion

SEC External Guide for Using Accellion Securities and Exchange Commission Office of Information Technology SEC External Guide for Using Accellion The Securities and Exchange Commission National Exam Program Hotline (202) 551-3925 Washington,

More information

Using Outlook Web App

Using Outlook Web App Using Outlook Web App About Outlook Web App Using a web browser and the Internet, Outlook Web App (OWA) provides access to your Exchange mailbox from anywhere in the world at any time. Outlook Web App

More information

Outlook Web Access User Guide

Outlook Web Access User Guide Table of Contents Title Page How to login...3 Create a new message/send attachment...5 Remove the reading pane...10 Calendar functions...11 Distribution lists...11 Contacts list...13 Tasks...18 Options...19

More information

GroupWise Web Access 8.0

GroupWise Web Access 8.0 GroupWise Web Access 8.0 How to check your email via the Internet For More Information, please contact: Administrative Office of the Courts Technology Help Desk (615) 532 9503 or (800) 448-7980 Table of

More information

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices

More information

Honeywell Secure Email External User Guide August 2013

Honeywell Secure Email External User Guide August 2013 Honeywell Secure Email External User Guide August 2013 PAGE: 1 of 14 Chapter No Table of Content Page No 1 Introduction 3 2 Using the Honeywell Secure Email Interface 3 3 Sending an Encrypted Email to

More information

FDIC Secure Email Procedures for External Users April 23, 2010

FDIC Secure Email Procedures for External Users April 23, 2010 FDIC Secure Email Procedures for External Users April 23, 2010 This document contains information proprietary to the Federal Deposit Insurance Corporation. Table of Contents 1. Introduction...2 2. Receiving

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery WHITE PAPER HIPPA Compliance and Secure Online Data Backup and Disaster Recovery January 2006 HIPAA Compliance and the IT Portfolio Online Backup Service Introduction October 2004 In 1996, Congress passed

More information

Prepared by Mythtech Limited OFFICE 365 EMAIL MIGRATION MANUAL GUIDELINE

Prepared by Mythtech Limited OFFICE 365 EMAIL MIGRATION MANUAL GUIDELINE Prepared by Mythtech Limited OFFICE 365 EMAIL MIGRATION MANUAL GUIDELINE Table of Contents Change Password... 1 Send New Email... 2 Forward E-mail... 3 Reply E-mail... 4 Archive old emails... 5 Office

More information

HIPAA Security Rule Compliance

HIPAA Security Rule Compliance HIPAA Security Rule Compliance Caryn Reiker MAXIS360 HIPAA Security Rule Compliance what is it and why you should be concerned about it Table of Contents About HIPAA... 2 Who Must Comply... 2 The HIPAA

More information

Microsoft Exchange 2007

Microsoft Exchange 2007 Microsoft Exchange 2007 On September 14, 2009 the College will convert its employee email system to Exchange 2007. This affects the email that you send and receive via your bucks.edu account. This conversion

More information

EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8

EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8 EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8 External Users Decrypting Secure Messages The following sections describe how users external to EJGH receive and decrypt secure messages. Reading

More information

Healthcare Compliance Solutions

Healthcare Compliance Solutions Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and

More information

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...

More information

Welcome to HomeTown Bank s Secure E-mail! User Guide

Welcome to HomeTown Bank s Secure E-mail! User Guide Welcome to HomeTown Bank s Secure E-mail! User Guide To access the secure email message center, click the Secure Email link on the www.htbmn.com main web page. Select whether you are a new user of the

More information

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice Appendix 4-2: Administrative, Physical, and Technical Safeguards Breach Notification Rule How Use this Assessment The following sample risk assessment provides you with a series of sample questions help

More information

Using the GroupWise Client

Using the GroupWise Client Spring 2006 (Our appreciation to Jennifer Sherouse for her assistance in editing and improving this document) Page 1 of 15 What is the GroupWise Client The GroupWise client is a program that installs on

More information

HIPAA Security Training Manual

HIPAA Security Training Manual HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,

More information

How Managed File Transfer Addresses HIPAA Requirements for ephi

How Managed File Transfer Addresses HIPAA Requirements for ephi How Managed File Transfer Addresses HIPAA Requirements for ephi 1 A White Paper by Linoma Software INTRODUCTION As the healthcare industry transitions from primarily using paper documents and patient charts

More information

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE How to Use this Assessment The following risk assessment provides you with a series of questions to help you prioritize the development and implementation

More information

Outlook Web Access An Introductory Guide

Outlook Web Access An Introductory Guide Outlook Web Access An Introductory Guide IT Training & Assessment Unit, Queen s University Belfast 1 Contents Logging on... 3 Email... 3 Compose a Message... 4 Saving an Email Attachment... 5 Saving a

More information

E Mail Encryption End User Guide

E Mail Encryption End User Guide E Mail Encryption End User Guide TABLE OF CONTENTS Why Use Email Encryption... 2 What is a Registered Envelope... 2 Features & Benefits... 2 Security Policies... 2 How to Compose and Send an Encrypted

More information

Outlook Operating Instructions. Internal Desktop Access

Outlook Operating Instructions. Internal Desktop Access Outlook Operating Instructions Internal Desktop Access OUTLOOK OPERATING INSTRUCTIONS (INTERNAL DESKTOP ACCESS) FREQUENTLY ASKED QUESTIONS & ANSWERS Q: How do I check my email while on campus? A: Click

More information

Microsoft Exchange 2010 Email Training. Microsoft Outlook 2007 Outlook Web App

Microsoft Exchange 2010 Email Training. Microsoft Outlook 2007 Outlook Web App Microsoft Exchange 2010 Email Training Microsoft Outlook 2007 Outlook Web App Table of Contents INTRODUCTION 1.1 What Does Microsoft Exchange Do? 1.2 Advantage/Disadvantage 1.3 Outlook 2007 vs. Outlook

More information

HIPAA Security. Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH

HIPAA Security. Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH HIPAA Security Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH What is this? Federal Regulations August 21, 1996 HIPAA Became Law October 16, 2003 Transaction Codes and Identifiers

More information

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE

More information

How To Set Up Your Email

How To Set Up Your Email How To Set Up Your Email Contents Page Microsoft Outlook 1 Outlook Express 6 7 Webmail (this is for those who do not use an email programme) 12 Windows Live Mail 22 Mozilla Thunderbird 26 Windows Mail

More information

Prerequisite. Getting Started. Email Signing and Encryption using Microsoft outlook 2007

Prerequisite. Getting Started. Email Signing and Encryption using Microsoft outlook 2007 Email Signing and Encryption using Microsoft outlook 2007 Prerequisite a. The user s email account has been added and correctly configured into Microsoft outlook. b. The user has an authentication certificate.

More information

C.T. Hellmuth & Associates, Inc.

C.T. Hellmuth & Associates, Inc. Technical Monograph C.T. Hellmuth & Associates, Inc. Technical Monographs usually are limited to only one subject which is treated in considerably more depth than is possible in our Executive Newsletter.

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

Getting Started... Login to your Account. Set your Preferences Once logged in, click Preferences on the left.

Getting Started... Login to your Account. Set your Preferences Once logged in, click Preferences on the left. Getting Started... Login to your Account https://med1.neocertifiedmail.com Mark the site as a favorite for quick reference for later. Set your Preferences Once logged in, click Preferences on the left.

More information

Webmail Instruction Guide

Webmail Instruction Guide Webmail Instruction Guide This document is setup to guide your through the use of the many features of our Webmail system. You may either visit www.safeaccess.com or webmail.safeaccess.com to login with

More information

Registering at the Securemail site

Registering at the Securemail site Registering at the Securemail site Before using the Secure Mail service for the first time, you must perform a one-time service registration by completing the following steps. 1. When a Secure Mail is

More information

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Security COMPLIANCE Checklist For Employers Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major

More information

Montclair State University. HIPAA Security Policy

Montclair State University. HIPAA Security Policy Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that

More information

Microsoft Outlook Web Access Handbook

Microsoft Outlook Web Access Handbook Microsoft Outlook Web Access Handbook Introduction Outlook Web access allows you to use a web browser (Internet Explorer or Firefox) to read your email, send email, and check your online calendar. This

More information

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics HIPAA SERIES Topics 1. 101 for Covered Entities 2. Standards - Administrative Safeguards 3. Standards - Physical Safeguards 4. Standards - Technical Safeguards 5. Standards - Organizational, Policies &

More information

Prerequisite. Getting Started. Email Signing and Encryption using Microsoft outlook 2010

Prerequisite. Getting Started. Email Signing and Encryption using Microsoft outlook 2010 Email Signing and Encryption using Microsoft outlook 2010 Prerequisite a. The user s email account has been added and correctly configured into Microsoft outlook. b. The user has an authentication certificate.

More information

Guidelines for using e-mail account through OWA

Guidelines for using e-mail account through OWA Guidelines for using e-mail account through OWA Logon to Outlook Web Access (OWA), UNITEN User E-mail. UNITEN User E-mail account is accessible through out the world. It is also known as OWA (Outlook Web

More information

Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started

Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Webmail User Manual Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Chapter 2 MAILENABLE KEY FEATURES OVERVIEW...

More information

U.S. Bank Secure Mail

U.S. Bank Secure Mail U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email

More information

HIPAA, PHI and Email. How to Ensure your Email and Other ephi are HIPAA Compliant. www.fusemail.com

HIPAA, PHI and Email. How to Ensure your Email and Other ephi are HIPAA Compliant. www.fusemail.com How to Ensure your Email and Other ephi are HIPAA Compliant How to Ensure Your Email and Other ephi Are HIPAA Compliant Do you know if the patient appointments your staff makes by email are compliant with

More information

Version 4 Revised 5/2015

Version 4 Revised 5/2015 Email Encryption Manual Version 4 Revised 5/2015 This document provides information on sending, receiving, and saving encrypted emails using the WRC Group Message Center. Contents What is Email Encryption...

More information

User Guide for Kelani Mail

User Guide for Kelani Mail User Guide for Kelani Mail Table of Contents Log in to Kelani Mail 1 Using Kelani Mail 1 Changing Password 2 Using Mail Application 3 Using email system folders 3 Managing Your Mail 4 Using your Junk folder

More information

Adding Digital Signature and Encryption in Outlook

Adding Digital Signature and Encryption in Outlook Adding Digital Signature and Encryption in Outlook Using Outlook, the email messages can be signed and encrypted by a digital certificate. To digitally sign a message in Outlook some conditions must be

More information

Authorized. User Agreement

Authorized. User Agreement Authorized User Agreement CareAccord Health Information Exchange (HIE) Table of Contents Authorized User Agreement... 3 CareAccord Health Information Exchange (HIE) Polices and Procedures... 5 SECTION

More information

Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services

Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services Introduction Patient privacy continues to be a chief topic of concern as technology continues to evolve. Now that the majority

More information

Exchange / Outlook. Items in the Exchange Folder area will be accessible from any computer anywhere that has Internet access via

Exchange / Outlook. Items in the Exchange Folder area will be accessible from any computer anywhere that has Internet access via Exchange / Outlook Microsoft Exchange/Outlook offers employees the opportunity to access their email anywhere at anytime through Web Access. Changes made through the Exchange Server will be shared to the

More information

EMAIL CONFIGURATION AND SETUP USER GUIDE AND REFERENCE MANUAL

EMAIL CONFIGURATION AND SETUP USER GUIDE AND REFERENCE MANUAL EMAIL CONFIGURATION AND SETUP USER GUIDE AND REFERENCE MANUAL The following manual will outline the configuration and setup for email access by any staff member. There are multiple ways to configure this

More information

ONE Mail Direct for Desktop Software

ONE Mail Direct for Desktop Software ONE Mail Direct for Desktop Software Version: 1 Document ID: 3931 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2015, ehealth Ontario All rights reserved No part of this document may

More information

Outlook Web Access E-mail

Outlook Web Access E-mail Outlook Web Access E-mail A. Accessing the mailbox via the Internet 1. Open your browser Firebox or Internet Explorer 2. In the URL address location box, key mail.asbury.edu for students and mail2.asbury.edu

More information

itrust Medical Records System: Requirements for Technical Safeguards

itrust Medical Records System: Requirements for Technical Safeguards itrust Medical Records System: Requirements for Technical Safeguards Physicians and healthcare practitioners use Electronic Health Records (EHR) systems to obtain, manage, and share patient information.

More information

S-Doc User Guide. Instructions on using the Secure Document Online Courier with the CAAT Pension Plan. September 2012

S-Doc User Guide. Instructions on using the Secure Document Online Courier with the CAAT Pension Plan. September 2012 S-Doc User Guide Instructions on using the Secure Document Online Courier with the CAAT Pension Plan Secure solution provided by Accellion September 2012 S E C U R E C O L L A B O R A T I O N U S E R G

More information

MSI Secure Mail Tutorial. Table of Contents

MSI Secure Mail Tutorial. Table of Contents Posted 1/12/12 Table of Contents 1 - INTRODUCTION... 1-1 INTRODUCTION... 1-1 Summary... 1-1 Why Secure Mail?... 1-1 Which Emails Must Be Encrypted?... 1-2 Receiving Email from MSI... 1-2 Sending Email

More information

Outlook 2010 Desk Reference Guide

Outlook 2010 Desk Reference Guide Outlook 2010 Desk Reference Guide Version 1.0 Developed by OR/WA IRM Please remember to print back-to-back. July 12, 2011 Microsoft Outlook 2010 This document has been developed by OR/WA IRM staff to provide

More information

To successfully initialize Microsoft Outlook (Outlook) the first time, email settings need to be verified.

To successfully initialize Microsoft Outlook (Outlook) the first time, email settings need to be verified. TO: UAN CLIENTS FROM: UAN STAFF DATE: OCTOBER 8, 2008 SUBJECT: Steps for Initial Setup of Microsoft Outlook To successfully initialize Microsoft Outlook (Outlook) the first time, email settings need to

More information

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance

More information

Microsoft Outlook. Transition from the ECS Exchange Server to the University Exchange Server. ECS Computing Services August 21, 2012 Version 3.

Microsoft Outlook. Transition from the ECS Exchange Server to the University Exchange Server. ECS Computing Services August 21, 2012 Version 3. Microsoft Outlook Transition from the ECS Exchange Server to the University Exchange Server ECS Computing Services August 21, 2012 Version 3.3 1 Table of Contents Transition Process... 4 What is going

More information

Outlook Web Access (OWA) for Staff

Outlook Web Access (OWA) for Staff Outlook Web Access (OWA) for Staff Note:The full version runs on Internet Explorer (IE) and the Light version runs on all other browsers (Firefox, Safari, Chrome etc). Web access URL / note the s after

More information

Email at Bradford - Outlook

Email at Bradford - Outlook This document provides guidance for staff using Office 365 with Microsoft Outlook 2010 for email at the University of Bradford. The University of Bradford retains copyright for this material, which may

More information

Executive Vice President of Finance and

Executive Vice President of Finance and Name of Policy: Policy Number: Electronic mail services policy. 3364-65-01 Approving Officer: Administration Executive Vice President of Finance and Responsible Agent: Vice President of Information Technology

More information

The online email environment

The online email environment The online email environment These are the options for the selected application. Navigation Pane is comprised of a folders list and oneclick access to your Inbox, Calendar, Contacts, and Tasks folders

More information

ITS HIPAA Security Compliance Recommendations

ITS HIPAA Security Compliance Recommendations ITS HIPAA Security Compliance Recommendations October 24, 2005 Updated May 31, 2010 http://its.uncg.edu/hipaa/security/ Table of Contents Introduction...1 Purpose of this Document...1 Important Terms...1

More information

How To Use Webmail. Guiding you through the Universities online email

How To Use Webmail. Guiding you through the Universities online email How To Use Webmail Guiding you through the Universities online email Table of Contents LOGGING ON...2 VIEWING MESSAGES...2 SENDING A MESSAGE...3 Using the University s Address Book...3 To send a message

More information

Secure Mail Registration and Viewing Procedures

Secure Mail Registration and Viewing Procedures Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email

More information

10/28/2013. Partners Zixmail Web Portal. Provider Training. Let s Get Started!

10/28/2013. Partners Zixmail Web Portal. Provider Training. Let s Get Started! Partners Zixmail Web Portal Provider Training Let s Get Started! 1 Setting Up Your Partners Zixmail Web Portal There are two methods to begin this process. Option #1 Use the link on the Partners Provider

More information

External End User Training Guide: Secure Email Extract

External End User Training Guide: Secure Email Extract External End User Training Guide: Secure Email Extract Version 6 August 12, 2013 Prepared by 7/29/2013: Kris Chromey, Training Coordinator Michelle Tuscher, Vault Implementation Coordinator Edited for

More information

Citrus Valley Health Partners. Web Outlook User Guide. Table of Contents

Citrus Valley Health Partners. Web Outlook User Guide. Table of Contents Citrus Valley Health Partners Web Outlook User Guide Table of Contents Getting Started Page Access to Web Outlook... 1 Log in Instructions... 1 Basic Navigation... 1 The Menu Bar... 1 The Reading Pane...

More information

E-mail Management: A Guide For Harvard Administrators

E-mail Management: A Guide For Harvard Administrators E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered

More information

Facilities and Safety How-To Guide: Accessing and Using Your UCF Webmail Account

Facilities and Safety How-To Guide: Accessing and Using Your UCF Webmail Account Launch Internet Explorer Click on the Internet Explorer icon at the bottom left of the computer screen. Go to the UCF Webmail Website 1. In the address bar at the top of the screen, type webmail.ucf.edu.

More information

Department of Alcohol & Drug Programs. Information Management Services Division (IMSD) EMAIL ENCRYPTION INSTRUCTIONS

Department of Alcohol & Drug Programs. Information Management Services Division (IMSD) EMAIL ENCRYPTION INSTRUCTIONS Department of Alcohol & Drug Programs (IMSD) EMAIL ENCRYPTION INSTRUCTIONS July 1, 2010 Why Do We Need Email Encryption? Code of Regulations, Title 45, Subtitle A, Part 164 The Health Insurance Portability

More information

GFI White Paper: GFI FaxMaker and HIPAA compliance

GFI White Paper: GFI FaxMaker and HIPAA compliance GFI White Paper: GFI FaxMaker and HIPAA compliance This document outlines the requirements of HIPAA in terms of faxing protected health information and how GFI Software s GFI FaxMaker, an easy-to-use fax

More information

HIPAA Security Education. Updated May 2016

HIPAA Security Education. Updated May 2016 HIPAA Security Education Updated May 2016 Course Objectives v This computer-based learning course covers the HIPAA, HITECH, and MSHA Privacy and Security Program which includes relevant Information Technology(IT)

More information

Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid)

Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has

More information

HIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1

HIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1 HIPAA COMPLIANCE AND DATA PROTECTION sales@eaglenetworks.it +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps

More information

CISCO SECURE MAIL. External User Guide. 1/15/15 Samson V.

CISCO SECURE MAIL. External User Guide. 1/15/15 Samson V. 1/15/15 Samson V. 1. These instructions are for users who reside outside the University of Colorado Denver that receive encrypted emails from faculty or staff of UC Denver. As a part of our HIPAA compliance

More information