Guidance for recipients of an encrypted NHSmail

Size: px
Start display at page:

Download "Guidance for recipients of an encrypted NHSmail email"

Transcription

1 Guidance for recipients of an encrypted NHSmail January 2015 V.03 Copyright 2013, Health and Social Care Information Centre. 1

2 Contents Introduction 3 Receiving an encrypted 3 Reply to and forward encrypted s 6 Registration 7 Start of registration 7 Register encryption account 9 Check your to activate your account 10 Registration confirmation message 10 Authentication Successful 11 Keeping encrypted s secure 12 Help and further guidance 13 Frequently asked questions 13 Copyright 2014, Health and Social Care Information Centre. 2

3 Introduction NHSmail is national secure service for health and social care designed to enable the secure exchange of information by . Users of the service send from an address ending with The service allows NHSmail users to send secure, encrypted s to any service such as free global hosted services such as Gmail/Hotmail and company run services. This document provides guidance for recipients of encrypted s sent from an NHSmail account. It explains how to open and read an encrypted and send an encrypted reply. It also provides important guidance about information governance and ensuring sensitive information that has been received remains secure. Please note it is not possible for anyone other than an NHSmail user to initiate an encrypted exchange using the NHSmail encryption feature. If you are a non-nhsmail user and wish to exchange information securely with a member of health or social care staff who uses NHSmail, please direct them to the document: Encryption guidance for senders January 15 in the NHSmail training and guidance pages at: in the section ing sensitive or patient identifiable information. Receiving an encrypted An encrypted will be sent from an NHSmail address and will contain a link to access the encrypted message. The message reads: TREND MICRO PRIVATE AND CONFIDENTIAL You have received an message Secured by Private Post. Please open the file called Encrypted_Message.htm for instructions on how to read your . Example received Copyright 2014, Health and Social Care Information Centre. 3

4 Fig 1. An encrypted NHSmail message in Gmail Open the file Encrypted_Message.htm. Your browser should allow you to either view the file directly or to download and then open the file. It is not necessary to install the Private Post Helper software to read encrypted s. Fig 2. The Encrypted_Message.htm file Click Open my in the Encrypted_Message.htm file. Not registered? If you have not previously received an encrypted NHSmail you will be redirected to an external website which will guide you through the registration process to create an account with the NHSmail encryption provider. See the section on Registration in this document. If you have registered with the NHSmail encryption provider, the system may display the Account Verification screen (Fig 3). If the screen does not display your correct address, click Change. Enter your Password. Or click Forgot your password or answers? if you have forgotten your password. Select a time from the Keep me signed in list. Click Continue. Copyright 2014, Health and Social Care Information Centre. 4

5 Fig 3. Account Verification The system will display the encrypted message sent to you from NHSmail Fig 4. A test encrypted You will be able to o Read the From, To, Sent and Subject information o Read the message o Reply to the sender o Reply to all recipients o Forward the o Download attachments Copyright 2014, Health and Social Care Information Centre. 5

6 Reply to and forward encrypted s You can reply to or forward encrypted s. Your s will be automatically encrypted. You can include attachments if required. Open an encrypted NHSmail Enter your password if the system prompts for it Click Reply or Reply All or Forward (as required) Enter the recipients in the TO: CC: and BCC: fields Edit the Subject field (as required) Add attachments (as required) Enter a message Click Send Copyright 2014, Health and Social Care Information Centre. 6

7 Fig 5. A decrypted Registration If you have not previously received an encrypted from the Trend Micro encryption service you will be redirected to the Trend Micro Private Post website. There you will be guided through the registration process to create an account with the NHSmail encryption provider. Registered recipients don t need to re-register to read subsequent encrypted messages sent from any NHSmail user. Start of registration Fig 6. Start of Registration Copyright 2014, Health and Social Care Information Centre. 7

8 If your address is not correctly displayed, click the (Not your ?) link Click Register The Register Encryption Account screen will be displayed. Copyright 2014, Health and Social Care Information Centre. 8

9 Register encryption account Fig 7. Register Encryption Account Complete all fields and tick the agreement box. Enter and confirm your password you will need to use this password to open encrypted s sent to you Select a security question and answer Select an Identification Word (that will appear on authentication screens) Type in the code displayed in the CAPTCHA image (the obscured code at the bottom of the screen aimed at preventing spam and fake registrations) Tick the box to confirm agreement to the Licence and Terms Click Continue The Check your to activate your account screen will be displayed. Copyright 2014, Health and Social Care Information Centre. 9

10 Check your to activate your account Fig 8. Check your to activate your account A message prompts you to check your inbox for a registration confirmation message and follow instructions in the message to confirm your encryption account. Click Close Page Registration confirmation message Fig 9. Registration confirmation message Open the Registration confirmation message in your Inbox. (If you do not see a Copyright 2014, Health and Social Care Information Centre. 10

11 registration confirmation in your Inbox, check your spam folder.) Click the link in the Registration confirmation message. Authentication Successful The Authentication Successful message will be displayed. Fig 10. Authentication Successful message Click Close Page This will complete your registration. Once you have successfully registered, you will be able to open, read and download any attachments in encrypted NHSmail s. Once you have completed registration, you are registered to receive encrypted from any NHSmail user and do not need to register again if another NHSmail user sends you an encrypted . To read and reply to another encrypted message you just need to verify your identity using the credentials you registered when you first signed up to the service. If you forget your password, the system includes a self-service password reset feature. If another organisation sends you an encrypted using the same Trend Micro encryption, your Trend Micro account credentials can be used to decrypt these messages too. Authentication screen once an account has been created: Copyright 2014, Health and Social Care Information Centre. 11

12 N.B. You do not need to click on the Want to Reply? link to use the service. Keeping encrypted s secure If you click on Want to reply click here to find out more (shown in screenshot above), you ll be given the opportunity to install a Microsoft Outlook add-on that will provide you with the means to send encrypted replies to s that you receive. You should be aware though that if you install the add-on to a shared computer, someone else could see confidential messages you have received. Before replying to an encrypted , ensure that the recipient is expecting it and is ready to handle the contents appropriately as part of an agreed clinical, or business partner sensitive data workflow, particularly if it contains sensitive or patient identifiable information. If you wish to keep any received s we recommend you download them and store them safely as required. Although all attachments sent or received through the NHSmail encryption service will be virus checked we do recommend you run your own anti-virus software. For third party organisations: please note it is your responsibility, on behalf of your employing organisation, to safeguard any data received in line with the data protection and information governance requirements agreed between your organisation and the sending organisation. You should retain unencrypted copies of any encrypted received in your local information repositories. If you are a patient and are receiving information from health or social care staff using the NHSmail service, you should have given consent to the organisation to exchange information with you before they send it. Once received, it is your responsibility to look after any sensitive information sent to you. You should consider whether the computer on which you access the information is shared with other people if so they may be able to view any information you receive. There are Copyright 2014, Health and Social Care Information Centre. 12

13 various excellent sources of guidance on how to keep information secure such as Help and further guidance For help please visit the Trend Micro support site at: Or you can call the national NHSmail helpdesk on or Recipients of NHSmail encrypted s that require help with registration should refer to the help provided on the registration website. Frequently asked questions Q: What is the maximum number of addresses that can be included on a reply to an encrypted or when the is forwarded? A: You can reply to, or forward the encrypted to a maximum of 200 recipients. Q: If I want to forward an encrypted I ve received to someone else, will the remain encrypted? A: Yes. Any recipient added will receive the message securely (encrypted). Q: Is message tracking (e.g. delivery or read receipts) available on encrypted s? A: No. delivery over the Internet has no guarantees that a message will reach its intended recipient as Internet can be silently lost. Q: What is the maximum attachment size I can send on encrypted replies / forwards? A: 20Mb Q: What types of attachments can be included on encrypted replies / forwards? A: Certain file types that can contain potentially harmful content are blocked by the NHSmail service and cannot be sent or received. The list of blocked attachments is below: File type avi bas bat chm cmd cnt com cpl crt Description Audio Video Interleaved animation file BASIC programming files DOS batch file MS compiled HTML help file OS/2 or Windows NT batch file Helpfile contents 16-bit DOS executable Windows Control Panel extension Security Certificate Copyright 2014, Health and Social Care Information Centre. 13

14 exe hlp hta inf ins isp js jse lnk Mdb mpe mpeg mpg mp2 mp3 msc msi msp mst pcd pif reg scr sct shs vbe vbs wsc wsf wsh DOS or Windows 16/32 bit executable Windows help files: 16-bit executable HTML file Windows installer setup file - 16-bit executable Internet naming service Internet communication settings JavaScript file. JavaScript encoded script Windows shortcut file Microsoft Access file format MPEG Movie Clip MPEG Movie Clip MPEG animation MPEG audio file mp3pro Audio file MS common console doc Windows installer file Windows installer patch Visual test source file Photo CD image` Program Information File Windows registry file Screen saver Windows script component Windows scrap object Visual Basic encoded script Visual Basic script Windows script component Windows script file Windows scripting host settings file Copyright 2014, Health and Social Care Information Centre. 14

Guidance for sending and receiving an encrypted NHSmail e-mail

Guidance for sending and receiving an encrypted NHSmail e-mail Contents Guidance for sending and receiving an encrypted NHSmail e-mail Introduction 2 Sending an encrypted e-mail to a VERIFIED e-mail address 2 Receiving an encrypted e-mail 4 Reply to and forward encrypted

More information

Microsoft Outlook 2003 Quick Reference

Microsoft Outlook 2003 Quick Reference Microsoft Outlook 2003 Quick Reference Table of Contents Creating Messages 3 Using the Address book 3 Sending messages 3 Saving unfinished messages 4 Adding attachments 4 Using automatic signatures 5 Reading

More information

Microsoft Outlook: Security Features. and Vulnerabilities

Microsoft Outlook: Security Features. and Vulnerabilities Microsoft Outlook: Security Features and Vulnerabilities ECE478 Report By: Mohammad Al-Fares Fares Al-Osaimi Abstract: Microsoft Outlook has been a favorite victim of virus makers for its relatively easy

More information

Anti-Virus Policy. Computing and Networking Services (CNS).

Anti-Virus Policy. Computing and Networking Services (CNS). Anti-Virus Policy Reference: CNS-P-I-ANTIVIRUS Revision: A Supersedes: Purpose: Source: None CNS is to provide a computing network that is virus-free. The purpose of this policy is to provide instructions

More information

BARRACUDA. N e t w o r k s SPAM FIREWALL 600

BARRACUDA. N e t w o r k s SPAM FIREWALL 600 BARRACUDA N e t w o r k s SPAM FIREWALL 600 Contents: I. What is Barracuda?...1 II. III. IV. How does Barracuda Work?...1 Quarantine Summary Notification...2 Quarantine Inbox...4 V. Sort the Quarantine

More information

End-User Reference Guide

End-User Reference Guide Guide Websense Advanced Email Encryption v7.6 Websense Advanced Email Encryption Copyright 1996-2011 Websense, Inc. All rights reserved. This document contains proprietary and confidential information

More information

End-User Reference Guide

End-User Reference Guide Guide Websense Advanced Email Encryption v7.6 Contents Receiving secure email....................................... 1 How do I open a secure message?............................ 1 How do I register for

More information

E-mail Encryption Recipient Guidelines

E-mail Encryption Recipient Guidelines E-mail Encryption Recipient Guidelines Canadian Western Bank Group Human Resources Department November 1, 2013 This reference guide was developed for training and reference use only. Any discrepancies

More information

Now select Properties and click the Folder Size button. This will show the size of all the folders in your mailbox and a grand total.

Now select Properties and click the Folder Size button. This will show the size of all the folders in your mailbox and a grand total. How do I Email & use Calendars with Outlook September 2014 How do I find someone s e-mail address? In order to e-mail almost anyone in the university you can simply type their name in the TO: box and Outlook

More information

End-User Reference Guide

End-User Reference Guide Guide Websense Advanced Email Encryption v7.x Websense Advanced Email Encryption Copyright 1996-2014 Websense, Inc. All rights reserved. This document contains proprietary and confidential information

More information

Secure Email Recipient Guide

Secure Email Recipient Guide Secure Email Recipient Guide Contents How to open your first Encrypted Message.... 3 Step-by-Step Guide to Opening Your First Envelope... 3 Step One:... 3 Step Two:... 4 Step Three:... 4 Step Four:...

More information

ARIMS Bulk Archive Tool (ARIMS-BAT) User s Guide v 3.7

ARIMS Bulk Archive Tool (ARIMS-BAT) User s Guide v 3.7 United States Army Records Management and Declassification Agency (USARMDA) ARIMS Bulk Archive Tool (ARIMS-BAT) User s Guide v 3.7 Prepared by October 17, 2013 Table of Contents 1 Overview...1 2 Using

More information

ADP Secure Email Client User Guide

ADP Secure Email Client User Guide ADP Secure Email Client User Guide A Guide to Exchanging Secure Emails Using the Voltage SecureMail System Version 1.0 July 2008 2008 ADP, Inc. Copyright Information ADP provides this publication as is

More information

Secure Mail Registration and Viewing Procedures

Secure Mail Registration and Viewing Procedures Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email

More information

TROUBLESHOOTING GUIDE

TROUBLESHOOTING GUIDE TROUBLESHOOTING GUIDE Page 1 OVERVIEW This document is intended to provide the following 1. Step by step procedures for troubleshooting and solving issues in the following SharePoint applications https://ishare.nielsen.com

More information

Vanguard Secure E-Mail Service (VSES) User Guide

Vanguard Secure E-Mail Service (VSES) User Guide Vanguard Secure E-Mail Service (VSES) User Guide Information Security Department January 8, 2013 Contents Guide for Users of Secure E-Mail From Vanguard 1 View Secure E-Mail 1 New Registration 3 Compose

More information

E Mail Encryption End User Guide

E Mail Encryption End User Guide E Mail Encryption End User Guide TABLE OF CONTENTS Why Use Email Encryption... 2 What is a Registered Envelope... 2 Features & Benefits... 2 Security Policies... 2 How to Compose and Send an Encrypted

More information

ADP Secure Email Client User Guide

ADP Secure Email Client User Guide ADP Secure Email Client User Guide A Guide to Exchanging Secure Emails Using the Voltage SecureMail System Version 1.6 August 2014 ADP Secure Email Client User Guide August 2014 Copyright Information ADP

More information

MessageGuard 3.0 User Guide

MessageGuard 3.0 User Guide MessageGuard 3.0 User Guide Table of Contents Introduction... 3 Installing the MessageGuard Desktop Client... 3 Sending Secure E-mail Messages with the Desktop Client... 11 Reading Secure E-mail Messages

More information

1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6

1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6 MailTrack How To Document 27 March 2014 Table of Contents 1. How to Register... 2 2. Forgot Password... 4 3. Login to MailTrack Webmail... 5 4. Accessing MailTrack message Centre... 6 5. Creating a MailTrack

More information

Instructions for Secure Email Cisco Registered Envelope Service (CRES)

Instructions for Secure Email Cisco Registered Envelope Service (CRES) Instructions for Secure Email Cisco Registered Envelope Service (CRES) Please read the official Cisco Guidance on the Cisco Registered Envelope Service And Frequently Asked Questions A courtesy attempt

More information

Using the PeaceHealth Secure E-mail System

Using the PeaceHealth Secure E-mail System 1 PeaceHealth is using a Secure E-mail System that allows for secure E-mail communications between individuals with a PeaceHealth E-mail address and individuals with E-mail addresses outside the PeaceHealth

More information

Receiving the First Encrypted Email and Registration:

Receiving the First Encrypted Email and Registration: Alpine Bank values our customers and the need to keep their personal and account information safe. For that reason, we have teamed with Websense and Voltage Security to provide advanced email protection

More information

Protecting computers from hidden threats. Implementation Guide. PestPatrol. In a Networked Environment

Protecting computers from hidden threats. Implementation Guide. PestPatrol. In a Networked Environment Protecting computers from hidden threats Implementation Guide PestPatrol In a Networked Environment TABLE OF CONTENTS Implementation Guide INTRODUCTION 3 PESTPATROL: A BRIEF OVERVIEW 3 PESTPATROL IN A

More information

Secure Email Client User Guide Receiving Secure Email from Mercantile Bank

Secure Email Client User Guide Receiving Secure Email from Mercantile Bank Receiving Secure Email from Contents This document provides a brief, end-user overview of the Secure Email system which has been implemented by. Why Secure Email? When someone sends you an email, the email

More information

FDIC Secure Email Procedures for External Users April 23, 2010

FDIC Secure Email Procedures for External Users April 23, 2010 FDIC Secure Email Procedures for External Users April 23, 2010 This document contains information proprietary to the Federal Deposit Insurance Corporation. Table of Contents 1. Introduction...2 2. Receiving

More information

This document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee.

This document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee. Email Encryption User Guide Sterne Agee is committed to the security of your information. We have implemented Cisco Email Encryption to secure email communication so that only you can open it.* Questions?

More information

Secure Email User Guide Receiving Secure Email from Merchants Bank

Secure Email User Guide Receiving Secure Email from Merchants Bank Secure Email User Guide Receiving Secure Email from Merchants Bank Contents This document provides a brief, end-user overview of the Cisco Registered Envelope Service Email system which has been implemented

More information

Nielsen Extranet - Troubleshooting Guide March 25, 2015

Nielsen Extranet - Troubleshooting Guide March 25, 2015 OVERVIEW This document is intended to provide the following: 1. Step by step procedures for troubleshooting and solving issues in the following SharePoint applications: https://extranet.nielsen.com https://myextranet.nielsen.com

More information

NITB Public & Partner File sharing Websites. User Guide

NITB Public & Partner File sharing Websites. User Guide NITB Public & Partner File sharing Websites User Guide SharePoint Online Page 1 of 23 Computer Services Table of Contents Table of Contents... 2 Introduction... 3 Accessing the Website... 4 Public Content...

More information

UQconnect Email+ for Life Basics

UQconnect Email+ for Life Basics UQconnect Email+ for Life Basics Course Objectives Read, Send, Reply to and Delete e-mail Locate and use addresses in an address book Send receive and open attachments Use folders to manage e- mail University

More information

Page 1 Rev Date: February 2010. User Manual for Encrypted Email Services

Page 1 Rev Date: February 2010. User Manual for Encrypted Email Services Page 1 User Manual for Encrypted Email Services Instructions for Using Encrypted Email Services This document is being provided to assist you in opening encrypted emails sent from Century Bank. The following

More information

NCH Secure Web Delivery Instructions

NCH Secure Web Delivery Instructions NCH Secure Web Delivery Instructions Typically when you send an email to a person, it is sent in Clear Text and can be viewed as it traverses the internet. Email is typically not considered a good vehicle

More information

U.S. Bank Secure Mail

U.S. Bank Secure Mail U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email

More information

Secure Email - Customer User Guide How to receive an encrypted email

Secure Email - Customer User Guide How to receive an encrypted email How to receive an encrypted email This guide has been developed for customers/suppliers of Glasgow City Council who are due to receive sensitive information from us. It will explain how to use our secure

More information

E-mail Encryption. How do I send my e-mail encryption key?

E-mail Encryption. How do I send my e-mail encryption key? E-mail Encryption SecurenCrypt e-mail encryption was designed to work as a plug-in with Microsoft Outlook. The following instructions are geared toward users encrypting e-mail with Outlook. However, throughout

More information

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8 BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8 User Guide SWDT653811-793266-0827104650-001 Contents Getting started... 3 About messaging service plans for BlackBerry

More information

SecureMail User Guide

SecureMail User Guide SecureMail User Guide Contents Secure email at HSBC. 2 About SecureMail... 2 Receiving a secure email sent via SecureMail 3 Opening a secure email sent via SecureMail... 4 Using SecureMail to reply to

More information

ANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS

ANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS OCIO-6006-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. Purpose II. Authority III. Scope IV. Definitions V. Policy VI. Roles and Responsibilities VII. Exceptions

More information

NOAA Unified Messaging System Policy

NOAA Unified Messaging System Policy NOAA Unified Messaging System Policy NOAA Unified Messaging System Enterprise Messaging Committee February 2010 Table of Contents 1. Purpose... 4 2. Roles and Responsibilities... 5 2.1. Enterprise Messaging

More information

HertSFX. User Guide V2.04. Hertfordshire s Secure File Exchange Portal. (Jan 2014) HertSFX User Guide V2.04 Jan 2014 Page 1 of 17

HertSFX. User Guide V2.04. Hertfordshire s Secure File Exchange Portal. (Jan 2014) HertSFX User Guide V2.04 Jan 2014 Page 1 of 17 Hertfordshire s Secure File Exchange Portal User Guide V2.04 (Jan 2014) HertSFX User Guide V2.04 Jan 2014 Page 1 of 17 CONTENTS 1. About HertSFX... 3 2. HertSFX Limitations... 3 3. Getting Started... 3

More information

Receiving Secure Email Customer Support frequently asked questions

Receiving Secure Email Customer Support frequently asked questions Registering a Secure Password Q. Where do I find the current Secure email guidance documentation? A. Published on Glasgow City Council website. Q. My organisation has its own email encryption tool, do

More information

Department of Alcohol & Drug Programs. Information Management Services Division (IMSD) EMAIL ENCRYPTION INSTRUCTIONS

Department of Alcohol & Drug Programs. Information Management Services Division (IMSD) EMAIL ENCRYPTION INSTRUCTIONS Department of Alcohol & Drug Programs (IMSD) EMAIL ENCRYPTION INSTRUCTIONS July 1, 2010 Why Do We Need Email Encryption? Code of Regulations, Title 45, Subtitle A, Part 164 The Health Insurance Portability

More information

SECURE Email User Guide

SECURE Email User Guide SECURE Email User Guide Receiving SECURE Email from Starion Financial Starion Financial is now offering an enhanced email encryption tool, IronPort PXE, which enables the email communication of sensitive

More information

Securemail User Guide

Securemail User Guide Securemail User Guide Created: 2009-02-17 Updated: 2013-07-05 - New links and Address Book instructions Updated: 2014-04-23 - http://dhhs.ne.gov/documents/dhhs-securemail-userguide.pdf 1 INDEX: How Securemail

More information

How to Send an Encrypted Email via KDADS' Outlook Client or Outlook Web Application

How to Send an Encrypted Email via KDADS' Outlook Client or Outlook Web Application How to Send an Encrypted Email via KDADS' Outlook Client or Outlook Web Application In order to ensure Personal Health Information (PHI) and Personally Identifiable Information (PII) is protected, KDADS

More information

Receiving Secure Email from Citi For External Customers and Business Partners

Receiving Secure Email from Citi For External Customers and Business Partners Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure

More information

P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems

P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems Procedure P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems P309 - Page: Page 1 of 12 Date of Release: 23 February 2011 Status: Final Document Reference: Title: P309 Release Number:

More information

Frequently Asked Questions

Frequently Asked Questions Privacy Security Compliance Frequently Asked Questions Email Encryption Services Watch our video tutorials at https:///support 199 Ave B NW Suite 20 Winter Haven, FL 881 800.87.122 Table of Contents General

More information

EBMS Secure Email. February 11, 2016 Instructions. Version 2

EBMS Secure Email. February 11, 2016 Instructions. Version 2 February 11, 2016 Instructions Version 2 Table of Contents Secure Email Upgrade... 3 Receiving Secure Email... 3 Viewing Past Secure Emails... 3 One-Time Registration... 4 Registration Screen... 5 Viewing

More information

Recipients Guide for Email Encryption Version 1.2

Recipients Guide for Email Encryption Version 1.2 Recipients Guide for Email Encryption Version 1.2 Document Location n/a Copies can be requested from the IT Dept 01603 50 8622 Revision Previous Revision by Summary of Changes Version date revision date

More information

Secure Email User Guide

Secure Email User Guide Secure Email User Guide Contents Secure email at HSBC. 2 About SecureMail... 2 Receiving a secure email sent via SecureMail 3 Opening a secure email sent via SecureMail... 4 Resetting your SecureMail password..

More information

Nationstar Mortgage Secure Email Client User Guide

Nationstar Mortgage Secure Email Client User Guide Nationstar Mortgage Secure Email Client User Guide A Guide to Exchanging Secure Emails Using the Nationstar Mortgage Secure Email Message Center Version 1.0 July 2010 1 Nationstar Public Copyright Information

More information

Email Encryption User Guide

Email Encryption User Guide Email Encryption User Guide August, 2013 Adapted from: Cisco Registered Envelope Recipient Guide Cisco Systems, Inc. TABLE of CONTENTS Section 1: Overview of Email Encryption... 3 Page Section 2: Overview

More information

Secure Email FAQs for External Stakeholders

Secure Email FAQs for External Stakeholders Secure Email FAQs for External Stakeholders Ver: 07 November 2012 What is secure email and why am I getting encrypted emails from the IPCC? Why do I have to register to open a Registered Envelope? What

More information

Honeywell Secure Email External User Guide August 2013

Honeywell Secure Email External User Guide August 2013 Honeywell Secure Email External User Guide August 2013 PAGE: 1 of 14 Chapter No Table of Content Page No 1 Introduction 3 2 Using the Honeywell Secure Email Interface 3 3 Sending an Encrypted Email to

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

How To Use An Ipo Switch For Third Parties

How To Use An Ipo Switch For Third Parties Egress Switch for Third Parties The London Borough of Lambeth is introducing a new more secure way of communicating with third parties. Third parties are: Individuals receiving a service from the council,

More information

Egress Switch for Third Parties

Egress Switch for Third Parties Egress Switch for Third Parties The London Borough of Tower Hamlets is introducing a new more secure way of communicating with third parties. Third parties are: Individuals receiving a service from the

More information

Overview of Registered Envelopes. Registered Envelope Notification Message

Overview of Registered Envelopes. Registered Envelope Notification Message Overview of Registered Envelopes A Registered Envelope is a type of encrypted email message. Some Registered Envelopes are password-protected, while others are encrypted but do not require a password.

More information

Orbital ATK Secure Email: Receiving Encrypted Messages. Why Orbital ATK Secure Email? Initial Email: Orbital ATK Secure Email Notification

Orbital ATK Secure Email: Receiving Encrypted Messages. Why Orbital ATK Secure Email? Initial Email: Orbital ATK Secure Email Notification Orbital ATK Secure Email: Receiving Encrypted Messages This document is intended for Orbital ATK Employees, Partners & Clients as an introduction & instructional user guide for Orbital ATK Secure Email.

More information

Experian Username and Password Self Service Facility. User Guide

Experian Username and Password Self Service Facility. User Guide Experian Username and Password Self Service Facility User Guide Contents 1 Document Control... 3 1.1 Version Control... 3 1.2 Document History... 3 2 New Users... 4 2.1 How to setup your security profile...

More information

Microsoft Exchange Hosted Archive (MEHA)

Microsoft Exchange Hosted Archive (MEHA) Microsoft Exchange Hosted Archive (MEHA) All the Features of NYSeMAIL Archiving including Using for Business Continuity Using MEHA Using MEHA The Microsoft Exchange Hosted Archive (MEHA) can be accessed

More information

Secure E-mail. Using Cisco Secure E-mail Server

Secure E-mail. Using Cisco Secure E-mail Server Secure E-mail Using Cisco Secure E-mail Server Background The UnitedHealthcare secure e-mail system is offered through Cisco Secure Server and is used to securely exchange information with providers. This

More information

Technical Documentation SEPPmail Outlook Add-In v1.5.3

Technical Documentation SEPPmail Outlook Add-In v1.5.3 Technical Documentation SEPPmail Outlook Add-In v1.5.3 This document describes how the SEPPmail Outlook Add-in works and the settings that can be configured. Page 2 Content 1 Introduction... 3 2 System

More information

Introduction to Email. Jan 24 th 2010

Introduction to Email. Jan 24 th 2010 Introduction to Email Jan 24 th 2010 Email Need special software (called email-reader or emailclient) to connect to the email-server and download the emails Email-server has limited space for each user

More information

Secure Email A Guide for Users

Secure Email A Guide for Users Secure Email A Guide for Users October 14, 2013 10/13 TABLE OF CONTENTS USING THE SYSTEM FOR THE FIRST TIME... 3 EMAIL NOTIFICATION OF SECURE INFORMATION... 3 GETTING REGISTERED ON THE SYSTEM... 4 ACCOUNT

More information

Texas Medicaid & Healthcare Partnership (TMHP)

Texas Medicaid & Healthcare Partnership (TMHP) Texas Medicaid & Healthcare Partnership (TMHP) E-Mail Encryption Basics/Help Guide Texas Medicaid & Healthcare Partnership Page 1 of 16 Print Date: 2/24/2009 Table of Contents LTC Online Portal User 1.0

More information

How to Use the File Transfer (FTP) Service

How to Use the File Transfer (FTP) Service How to Use the File Transfer (FTP) Service How to Use the File Transfer (FTP) Service...1 What is a File Transfer Service?...2 First Steps...2 How to Upload Files to the File Transfer Service...2 How to

More information

MSGCU SECURE MESSAGE CENTER

MSGCU SECURE MESSAGE CENTER MSGCU SECURE MESSAGE CENTER Welcome to the MSGCU Secure Message Center. Email is convenient, but is it secure? Before reaching the intended recipient, email travels across a variety of public servers and

More information

How To Use The Gtokus Secure Mail System

How To Use The Gtokus Secure Mail System Department of Banking and Finance (DBF) Secure Message Center DBF Secure E-Mail Procedures This document contains information proprietary to the Georgia Department of Banking and Finance and shall not

More information

Vaaler Insurance, Inc. RPost Email. Guidelines and Instructions. Sherry D Samson. rev 10/1/15 by BH

Vaaler Insurance, Inc. RPost Email. Guidelines and Instructions. Sherry D Samson. rev 10/1/15 by BH Vaaler Insurance, Inc. RPost Email Guidelines and Instructions Sherry D Samson 2015 rev 10/1/15 by BH Contents RPost Guidelines... 3 Registered Email no encryption or signature required... 5 Registered

More information

Department of Behavioral Health (DBH) Staff. CaSonya Thomas, MPA, CHC, Director

Department of Behavioral Health (DBH) Staff. CaSonya Thomas, MPA, CHC, Director Date November 18, 2015 To: (DBH) Staff From: CaSonya Thomas, MPA, CHC, Director Subject: Electronic Mail (e-mail) Encryption Introduction DBH's Office of Information Technology, in partnership with the

More information

Can I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.

Can I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID. How does Secure E-mail work? When an e-mail is initiated or responded to the secure e-mail algorithm will determine if the e-mail needs to be encrypted based on predefined criteria. If it meets the predefined

More information

Policy Based Encryption Z. Administrator Guide

Policy Based Encryption Z. Administrator Guide Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Secure Email Frequently Asked Questions

Secure Email Frequently Asked Questions Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support

More information

Rev. 06 JAN. 2008. Document Control User Guide: Using Outlook within Skandocs

Rev. 06 JAN. 2008. Document Control User Guide: Using Outlook within Skandocs Rev. 06 JAN. 2008 Document Control User Guide: Using Outlook within Skandocs Introduction By referring to this user guide, it is assumed that the user has an advanced working knowledge of Skandocs (i.e.

More information

Egress Switch (Secure Email) for Third Parties

Egress Switch (Secure Email) for Third Parties Egress Switch (Secure Email) for Third Parties The London Borough of Redbridge is implementing a new more secure way of communicating with third parties. Third parties are: Individuals receiving a service

More information

Background Information

Background Information User Guide 1 Background Information ********************************Disclaimer******************************************** This is a government system intended for official use only. Using this system

More information

Borough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments

Borough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments Borough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments V8 Contents What is Encryption?...3 Why do I need to know about it?...3 How do I use it?...3 What

More information

Secure Messaging Service

Secure Messaging Service Human Resources Secure Messaging Service Receiving Secure Emails from West Berkshire Council Table of Contents What are Secure Messaging notifications?... 3 How do I set up my Secure Messaging account?...

More information

How to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide

How to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide How to remotely access your Virtual Desktop from outside the college using VMware View Client How to guide Author: ICT Services Version: 1.0 Date: November 2015 Contents What is the VMware View Client?...

More information

Using Voltage SecureMail

Using Voltage SecureMail Using Voltage SecureMail Using Voltage SecureMail Desktop Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending a secure email as easy as sending it without encryption.

More information

Unipass Securemail Client. User Guide v1.2

Unipass Securemail Client. User Guide v1.2 Unipass Securemail Client User Guide v1.2 This document provides a step by step illustrated user guide for the Unipass Securemail desktop software client / plug-in. UIdP Project Team 28/06/2015 Contents

More information

Secure Email User Guide

Secure Email User Guide Secure Email User Guide Transport Layer Security (TLS) Pretty Good Privacy (PGP) PDF Messenger 1 Contents 1 Introduction... 3 2 Transport Layer Security (TLS).4 3 Pretty Good Privacy (PGP).5 4 PDF Messenger...

More information

johnireland@eircom.net

johnireland@eircom.net Email Electronic mail is the transmission of mainly text based messages across networks. This can be within a particular network - internal mail - or between networks - external mail. The most common network

More information

Steps to Opening Your First Password-Protected Envelope

Steps to Opening Your First Password-Protected Envelope This section provides step-by-step instructions for opening a password-protected Registered Envelope for the first time. The steps demonstrate a typical scenario for a first-time recipient. Some of the

More information

Reading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM)

Reading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM) Reading an email sent with Voltage SecureMail Using the Voltage SecureMail Zero Download Messenger (ZDM) SecureMail is an email protection service developed by Voltage Security, Inc. that provides email

More information

Setting up and controlling E-mail

Setting up and controlling E-mail Setting up and controlling E-mail Two methods Web based PC based Setting up and controlling E-mail Web based the messages are on the Internet accessed by dial-up or broadband at your Internet Service Provider

More information

Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started

Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Webmail User Manual Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Chapter 2 MAILENABLE KEY FEATURES OVERVIEW...

More information

Unipass Securemail Client FAQ Document v1.1. This document a summary of some of the most common questions asked about the Unipass Securemail client.

Unipass Securemail Client FAQ Document v1.1. This document a summary of some of the most common questions asked about the Unipass Securemail client. Unipass Securemail Client FAQ Document v1.1 This document a summary of some of the most common questions asked about the Unipass Securemail client. UIdP Project Team 28/06/2014 Contents Section 1 - Unipass

More information

Frequently Asked Questions The next section includes FAQs to help you to access and use your student email account.

Frequently Asked Questions The next section includes FAQs to help you to access and use your student email account. Factsheet 22 Student Email September 2011 This factsheet can be made available in alternative formats. Please make your request at the Library Help Desk, telephone 01642 342100 or email libraryhelp@tees.ac.uk

More information

MUTUAL OF OMAHA SECURE EMAIL SYSTEM CLIENT/PARTNER USER GUIDE

MUTUAL OF OMAHA SECURE EMAIL SYSTEM CLIENT/PARTNER USER GUIDE MUTUAL OF OMAHA SECURE EMAIL SYSTEM CLIENT/PARTNER USER GUIDE Mutual of Omaha Secure Email Client/Partner User Guide April 2015 TABLE OF CONTENTS INTRODUCTION 3 About this Guide 3 CREATING A MUTUAL OF

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

2.2.1 Malware Protection (Inbound)... 14

2.2.1 Malware Protection (Inbound)... 14 .trust Table of Contents About This Document 2 1 Non-Rule Functionality 2 1.1 Disclaimers (Message Stamps)... 2 1.2 Administrative Email Addresses... 2 1.3 Notifications... 2 1.4 Digests... 2 1.5 Blended

More information

SECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011

SECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011 SECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011 Introduction In October, 2008, the Division of Welfare and Supportive Services (DWSS) announced the introduction of secure e-mail through ASM 17-08.

More information

EMAIL: How to setup Outlook and Outlook Web Access (OWA) to give a send receipt and a read receipt (Options)

EMAIL: How to setup Outlook and Outlook Web Access (OWA) to give a send receipt and a read receipt (Options) EMAIL: How to setup Outlook and Outlook Web Access (OWA) to give a send receipt and a read receipt (Options) Versions: Outlook 2003 and OWA 2003 Purpose: To show how a user can setup an email message such

More information