Secure . Instructions for Use

Size: px
Start display at page:

Download "Secure email. Instructions for Use"

Transcription

1 Secure Instructions for Use Contents Introduction... 2 Opening an encrypted Attachments... 7 Sending and Replying to s... 8 Returning to and accessing your encrypted s after you have registered Forgotten password Problems & Support

2 Introduction The IPCC takes great care to ensure that personal information is handled securely. This applies to information when it is in our possession but also when we send information externally. The IPCC communicates to stakeholders in a number of ways including over . However when sending s to addresses that are not on secure government networks, there is a risk that they can be intercepted and read by unauthorised third parties before they reach the intended recipient. Owing to this risk, the IPCC has implemented a secure facility called Cisco Ironport. This system provides a greater level of protection for s sent to non-secure addresses. When you receive an encrypted from the IPCC you will need to follow these instructions to access the information contained within it. 2

3 Opening an encrypted 1) When you receive an from the IPCC, open it like you would a normal . When the opens you will see the message shown in figure 1 below. Figure 1 2) As per the instruction in figure 1, open the attachment, securedoc.html, and the browser window in figure 2 will open. Figure 2 3

4 3) If this is the first time you have received an encrypted from the IPCC, you will need to register on the IPCC s secure service. The first step is to click on the yellow REGISTER button highlighted in figure 2. 4) The screen in figure 3 will then appear. You will need to complete your details and provide a password of your choice. This will be your only opportunity to make a note of your password. The IPCC recommends that you also provide a personal security phrase. For more information on the personal security phrase and the remember on this computer tick box, please refer to the secure FAQs. Figure 3 Please note that your password needs to be a minimum of 9 characters in length and must contain at least one uppercase letter, one lower case letter and one number. 5) When you have completed the required fields click the yellow REGISTER button highlighted above. When you have successfully registered you will see the screen in figure 4 below. 4

5 Figure 4 6) Close the browser window. You will return to the screen in figure 2, however the REGISTER button will now say CONTINUE. See figure 5 below. Figure 5 7) Click the yellow CONTINUE button and the screen in figure 6 below will appear. Enter the password you have just chosen and click the yellow OPEN button. 5

6 Figure 6 8) When the system accepts the password, the you have been sent by the IPCC will then appear see figure 7. Figure 7 6

7 Attachments Secure is capable of sending attachments to and from the IPCC. There may be an attachment with your . If so, it is very simple to view or save the attachment. All you need to do is follow these steps. 1) Attachments will be displayed underneath the subject line of the (see figure 7). Click on the name of the attachment and you will be prompted to open (view) the file or save (download) it to your computer (figure 8). Figure 8 2) If you click Open, the attachment will open on your computer but will not save automatically. For best results, save the file first, then open it in a Web browser. To send an attachment back to the IPCC please see the Replying to s section of this document. 7

8 Sending and Replying to s The IPCC s secure service allows for secure two-way communication. In other words you can reply to the the IPCC has sent you and your will also be encrypted. Please note that if you want to send the IPCC a secure , you must first request the IPCC to send you an using the Secure service. The only way you can send your own secure is by replying to a secure sent to you by the IPCC. 1) If you haven t already, log in to the IPCC Secure service following the instructions in the Opening a secure section. 2) To reply to a secure , make sure the is open and click the reply button. See figure 7. The window in figure 9 below will then appear on your screen. Write your message in the message box and click send. Figure 9 3) If you want to attach a document, click the yellow ATTACHMENTS button. You will then see the window in figure 10: 8

9 Figure 10 4) Click BROWSE, find the document and select it. The name of the file will appear in the attachment box. Click the ADD button to attach it to the . 5) When the name of the file disappears from the attachment box, the document has attached itself to your . Click the yellow DONE button and you will be returned to your . 6) Back at the , the name of your attachment should be displayed as a hyperlink. If it isn t, go through the attachment process again. 7) When you are ready, click the yellow SEND button. When your message has been sent securely to the IPCC you will see this window: Figure 11 9

10 Returning to and accessing your encrypted s after you have registered You may want to access the the IPCC sent you again after you have registered on the IPCC s secure service. In order to do this you will need to keep the original that the IPCC sent you as you will need to open the original attachment. 1) When you open the from the IPCC, open the attachment, securedoc.html. See Opening an encrypted figure 1. 2) You will then be directed straight to the logon screen shown earlier in figure 6. 3) Enter your password and click the yellow OPEN button. 4) When the system accepts the password, the you have been sent by the IPCC will then appear see figure 7. 10

11 Forgotten password If you get to the logon screen (see figure 6) and you discover that you have forgotten your password, there is a simple process you can follow to reset your password. 1) On the logon screen, click the Forgot password link highlighted in figure 12 below.. Figure 12 2) You will be directed to the forgotten password page (see figure 13 below). Figure 13 3) Insert your address and click the yellow CONTINUE button. You will then see a window confirming that a temporary password has been sent to your address (see figure 14). 11

12 Figure 14 4) Retrieve the temporary password from the that you have been sent. When you login again you will need to enter the temporary password and then immediately choose a new password of your choice. See figure 15 below. Figure 15 5) When you have chosen your new password click the yellow CHANGE button. When your password has been successfully changed you will see the window in figure

13 Figure 16 6) Click the click here to log in link and follow the login procedure as previously detailed in these instructions. 7) If after you have clicked the click here to log in link, you find you cannot log back in with your new password, close down all the windows you have open and return to the original in your inbox. Follow the login process from the beginning making sure you enter your new password. Problems & Support If you experience any problems with the Secure Mail Service please report them to your IPCC point of contact. 13

CISCO SECURE MAIL. External User Guide. 1/15/15 Samson V.

CISCO SECURE MAIL. External User Guide. 1/15/15 Samson V. 1/15/15 Samson V. 1. These instructions are for users who reside outside the University of Colorado Denver that receive encrypted emails from faculty or staff of UC Denver. As a part of our HIPAA compliance

More information

Secure Email Actions for Email Recipients

Secure Email Actions for Email Recipients Secure Email Actions for Email Recipients Actions for Email Recipients The recipient cannot forward encrypted email outside the secure system. Each email will only be available to the recipient for 30

More information

Secure Email A Guide for Users

Secure Email A Guide for Users Secure Email A Guide for Users October 14, 2013 10/13 TABLE OF CONTENTS USING THE SYSTEM FOR THE FIRST TIME... 3 EMAIL NOTIFICATION OF SECURE INFORMATION... 3 GETTING REGISTERED ON THE SYSTEM... 4 ACCOUNT

More information

Email Encryption. Cisco Ironport. using. Click here to begin

Email Encryption. Cisco Ironport. using. Click here to begin Email Encryption using Cisco Ironport Click here to begin Contents Sending an encrypted email Receiving an encrypted email - Registering with Cisco - Opening the email (after registration) Replying to

More information

Secure Email FAQs for External Stakeholders

Secure Email FAQs for External Stakeholders Secure Email FAQs for External Stakeholders Ver: 07 November 2012 What is secure email and why am I getting encrypted emails from the IPCC? Why do I have to register to open a Registered Envelope? What

More information

Orbital ATK Secure Email: Receiving Encrypted Messages. Why Orbital ATK Secure Email? Initial Email: Orbital ATK Secure Email Notification

Orbital ATK Secure Email: Receiving Encrypted Messages. Why Orbital ATK Secure Email? Initial Email: Orbital ATK Secure Email Notification Orbital ATK Secure Email: Receiving Encrypted Messages This document is intended for Orbital ATK Employees, Partners & Clients as an introduction & instructional user guide for Orbital ATK Secure Email.

More information

FDIC Secure Email Procedures for External Users April 23, 2010

FDIC Secure Email Procedures for External Users April 23, 2010 FDIC Secure Email Procedures for External Users April 23, 2010 This document contains information proprietary to the Federal Deposit Insurance Corporation. Table of Contents 1. Introduction...2 2. Receiving

More information

UC Irvine Health Secure Mail Message Center

UC Irvine Health Secure Mail Message Center UC Irvine Health Secure Mail Message Center UC Irvine Health is committed to protecting the privacy of its member s information, especially their protected health information (PHI). UC Irvine Health is

More information

Secure Mail Registration and Viewing Procedures

Secure Mail Registration and Viewing Procedures Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email

More information

E-mail Encryption Recipient Guidelines

E-mail Encryption Recipient Guidelines E-mail Encryption Recipient Guidelines Canadian Western Bank Group Human Resources Department November 1, 2013 This reference guide was developed for training and reference use only. Any discrepancies

More information

Figure 1. Deskguide Tumbleweed External User Instructions Page 1 of 5

Figure 1. Deskguide Tumbleweed External User Instructions Page 1 of 5 This document provides instructions for communicating with the (DSS) through secure email, also known as Tumbleweed. It will tell you how to: 1. Know that you have received a secure email and how to access

More information

Welcome to HomeTown Bank s Secure E-mail! User Guide

Welcome to HomeTown Bank s Secure E-mail! User Guide Welcome to HomeTown Bank s Secure E-mail! User Guide To access the secure email message center, click the Secure Email link on the www.htbmn.com main web page. Select whether you are a new user of the

More information

Honeywell Secure Email External User Guide August 2013

Honeywell Secure Email External User Guide August 2013 Honeywell Secure Email External User Guide August 2013 PAGE: 1 of 14 Chapter No Table of Content Page No 1 Introduction 3 2 Using the Honeywell Secure Email Interface 3 3 Sending an Encrypted Email to

More information

Instructions For Opening UHA Encrypted Email

Instructions For Opening UHA Encrypted Email Receiving Encrypted Email You have received a secure, encrypted message from UHA. The message will contain the following notice and an attachment named SecureMessageAtt.hml. The attachment is shown circled

More information

U.S. Bank Secure Mail

U.S. Bank Secure Mail U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email

More information

Secure Email User Guide Receiving Secure Email from Merchants Bank

Secure Email User Guide Receiving Secure Email from Merchants Bank Secure Email User Guide Receiving Secure Email from Merchants Bank Contents This document provides a brief, end-user overview of the Cisco Registered Envelope Service Email system which has been implemented

More information

SEC External Guide for Using the E-mail Encryption Solution

SEC External Guide for Using the E-mail Encryption Solution Securities and Exchange Commission Office of Information Technology SEC External Guide for Using the E-mail Encryption Solution The Securities and Exchange Commission National Exam Program Hotline (202)551-3925

More information

Email Encryption User Guide

Email Encryption User Guide Email Encryption User Guide August, 2013 Adapted from: Cisco Registered Envelope Recipient Guide Cisco Systems, Inc. TABLE of CONTENTS Section 1: Overview of Email Encryption... 3 Page Section 2: Overview

More information

MUTUAL OF OMAHA SECURE EMAIL SYSTEM CLIENT/PARTNER USER GUIDE

MUTUAL OF OMAHA SECURE EMAIL SYSTEM CLIENT/PARTNER USER GUIDE MUTUAL OF OMAHA SECURE EMAIL SYSTEM CLIENT/PARTNER USER GUIDE Mutual of Omaha Secure Email Client/Partner User Guide April 2015 TABLE OF CONTENTS INTRODUCTION 3 About this Guide 3 CREATING A MUTUAL OF

More information

SECURE Email User Guide

SECURE Email User Guide SECURE Email User Guide Receiving SECURE Email from Starion Financial Starion Financial is now offering an enhanced email encryption tool, IronPort PXE, which enables the email communication of sensitive

More information

Encrypted Email Opening and Replying to a Secure Message

Encrypted Email Opening and Replying to a Secure Message First Time User Registration Opening a Secure Encrypted Email Where to go for Help Frequently Asked Questions Information Technology Encrypted Email Opening and Replying to a Secure Message First Time

More information

Page 1 Rev Date: February 2010. User Manual for Encrypted Email Services

Page 1 Rev Date: February 2010. User Manual for Encrypted Email Services Page 1 User Manual for Encrypted Email Services Instructions for Using Encrypted Email Services This document is being provided to assist you in opening encrypted emails sent from Century Bank. The following

More information

MSGCU SECURE MESSAGE CENTER

MSGCU SECURE MESSAGE CENTER MSGCU SECURE MESSAGE CENTER Welcome to the MSGCU Secure Message Center. Email is convenient, but is it secure? Before reaching the intended recipient, email travels across a variety of public servers and

More information

CLIENT ACCESS> emoney

CLIENT ACCESS> emoney CLIENT ACCESS> emoney emoney is a financial planning website that allows you to view all of your accounts in one user friendly location. Not only can you view all of your accounts held with Archstone Financial,

More information

Secure Messaging Service

Secure Messaging Service Human Resources Secure Messaging Service Receiving Secure Emails from West Berkshire Council Table of Contents What are Secure Messaging notifications?... 3 How do I set up my Secure Messaging account?...

More information

Accessing a Secure Message. Outside the COV Email Network

Accessing a Secure Message. Outside the COV Email Network Stay Connected! Use this Guide to help you read encrypted Accessing a Secure Message messages from DHRM sent to a non-cov email address. Outside the COV Email Network Accessing a Secure Message Outside

More information

Borough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments

Borough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments Borough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments V8 Contents What is Encryption?...3 Why do I need to know about it?...3 How do I use it?...3 What

More information

External User's Guide to State of Iowa Secure Email System

External User's Guide to State of Iowa Secure Email System STATE OF IOWA External User's Guide to State of Iowa Secure Email System This guide contains step by step instructions for setting up and using the State of Iowa Secure Email system. Contents Secure Email...

More information

Secure Message Center User Guide

Secure Message Center User Guide Secure Message Center User Guide Using the Department of Banking Secure Email Message Center 2 Receiving and Replying to Messages 3 Initiating New Messages 7 Using the Address Book 9 Managing Your Account

More information

This document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee.

This document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee. Email Encryption User Guide Sterne Agee is committed to the security of your information. We have implemented Cisco Email Encryption to secure email communication so that only you can open it.* Questions?

More information

Guide to setting up and using secure e-mail

Guide to setting up and using secure e-mail How to set up secure email Guide to setting up and using secure e-mail 1. To request that a secure email is set up. Send an email 1 to the following address: earlyedgrantclaims@suffolk.gov.uk 2. In response

More information

Children s Service. Secure Email Guide for external users

Children s Service. Secure Email Guide for external users Children s Service Secure Email Guide for external users Contents 1. Secure email introduction 2. receiving a secure email for the first time 3. Logging on to the secure email portal 4. Changing your password

More information

Receiving Secure Email Customer Support frequently asked questions

Receiving Secure Email Customer Support frequently asked questions Registering a Secure Password Q. Where do I find the current Secure email guidance documentation? A. Published on Glasgow City Council website. Q. My organisation has its own email encryption tool, do

More information

Department of Alcohol & Drug Programs. Information Management Services Division (IMSD) EMAIL ENCRYPTION INSTRUCTIONS

Department of Alcohol & Drug Programs. Information Management Services Division (IMSD) EMAIL ENCRYPTION INSTRUCTIONS Department of Alcohol & Drug Programs (IMSD) EMAIL ENCRYPTION INSTRUCTIONS July 1, 2010 Why Do We Need Email Encryption? Code of Regulations, Title 45, Subtitle A, Part 164 The Health Insurance Portability

More information

TriCore Secure Web Email Gateway User Guide 1

TriCore Secure Web Email Gateway User Guide 1 TriCore Secure Web Email Gateway User Guide This document provides information about TriCore Secure Web Email Gateway. This document is for users who are authorized to send and receive encrypted email

More information

P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems

P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems Procedure P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems P309 - Page: Page 1 of 12 Date of Release: 23 February 2011 Status: Final Document Reference: Title: P309 Release Number:

More information

Email Encryption Procedures

Email Encryption Procedures Email Encryption Procedures Contents: I. Compose an Encrypted Message II. What Your Recipients Will Receive a. Registering a NewAccount b. Logging into a Created Account c. Reading and Replying III. Reading

More information

Regions Secure Webmail. Instructions

Regions Secure Webmail. Instructions Regions Secure Webmail Instructions Regions Bank Member FDIC Revised 092015 REGIONS SECURE WEBMAIL Regions has established privacy guidelines to protect customers, vendors, and associates of Regions Bank.

More information

Overview of Registered Envelopes. Registered Envelope Notification Message

Overview of Registered Envelopes. Registered Envelope Notification Message Overview of Registered Envelopes A Registered Envelope is a type of encrypted email message. Some Registered Envelopes are password-protected, while others are encrypted but do not require a password.

More information

User Guide. Delta Controls Single Sign On

User Guide. Delta Controls Single Sign On User Guide Delta Controls Single Sign On This document outlines the new, streamlined login process for Delta Partner web applications using the Delta Controls Passport Single Sign On system. Contents 1

More information

Baylor Secure Messaging. For Non-Baylor Users

Baylor Secure Messaging. For Non-Baylor Users Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7

More information

account multiple solutions

account multiple solutions Quick Start Guide 1 Our easy to use guide will get you up and running in no time! The guide will assist you with: Generating your Sage Pay login Navigation Creating contacts Creating system users Setting

More information

Securemail User Guide

Securemail User Guide Securemail User Guide Created: 2009-02-17 Updated: 2013-07-05 - New links and Address Book instructions Updated: 2014-04-23 - http://dhhs.ne.gov/documents/dhhs-securemail-userguide.pdf 1 INDEX: How Securemail

More information

Barracuda User Guide. Managing your Spam Quarantine

Barracuda User Guide. Managing your Spam Quarantine Managing your Spam Quarantine Barracuda User Guide Step1: Open your internet browser and go to http://myspam.datatechhosting.com this will automatically redirect you to Barracuda s email security service

More information

Secure Email Client User Guide Receiving Secure Email from Mercantile Bank

Secure Email Client User Guide Receiving Secure Email from Mercantile Bank Receiving Secure Email from Contents This document provides a brief, end-user overview of the Secure Email system which has been implemented by. Why Secure Email? When someone sends you an email, the email

More information

January 31, 2006 v2.0 Page 1 of 15

January 31, 2006 v2.0 Page 1 of 15 This document describes the Enrollment Server component of the LPCH Secure Email service. The Enrollment Server is used to register and track the unique identities of recipients of Secure Email who are

More information

Directory and Messaging Services Enterprise Secure Mail Services

Directory and Messaging Services Enterprise Secure Mail Services Title: Directory and Messaging Services Enterprise Secure Mail Services Enterprise Secure Mail Services for End Users Attention: Receivers of Secure Mail Retrieval of Secure Mail by the Recipient Once

More information

Novo Nordisk Secure File Transfer User Guide

Novo Nordisk Secure File Transfer User Guide hehe Novo Nordisk Secure File Transfer User Guide Table of Contents 1. Purpose of this document... 2 2. Getting Access... 2 3. Installing the Upload/Download Wizard (first time only)... 2 4. Uploading

More information

New PHI & PII E-mail Encryption Solution

New PHI & PII E-mail Encryption Solution New PHI & PII E-mail Encryption Solution (Partner Notification) In a continuing effort to utilize the advantages of email security while at the same time protecting clients private information, the Department

More information

Proofpoint provides the capability for external users to send secure/encrypted emails to EBS-RMSCO employees.

Proofpoint provides the capability for external users to send secure/encrypted emails to EBS-RMSCO employees. Proofpoint provides the capability for external users to send secure/encrypted emails to EBS-RMSCO employees. To create a new email message to be sent securely to an EBS-RMSCO employee: 1. Click on the

More information

Reset Virtual Gateway Password Job Aid

Reset Virtual Gateway Password Job Aid Summary of Job Aid In order to access a Virtual Gateway s business service, you must first log on to the Virtual Gateway (VG). From the Virtual Gateway s website (www.mass.gov/vg), click Logon to Virtual

More information

SecureMail User Guide

SecureMail User Guide SecureMail User Guide Contents Secure email at HSBC. 2 About SecureMail... 2 Receiving a secure email sent via SecureMail 3 Opening a secure email sent via SecureMail... 4 Using SecureMail to reply to

More information

Use your UNNCNetID and password to log in. The first time you login to the system, you may receive the following screen:

Use your UNNCNetID and password to log in. The first time you login to the system, you may receive the following screen: (Secure FTP to/from Outside (non-unmc Parties) Information Technology Services July 2012 Contact the ITS Helpdesk at 402-559-7700 or helpdesk@unmc.edu with questions. Personnel at UNMC occasionally need

More information

Monash Health Self Service

Monash Health Self Service Monash Health Self Service Table of Contents Monash Health Self Service Password Reset \ Account Unlock via a Non-Monash Workstation... 2 Monash Health Self Service Password Reset \ Account Unlock via

More information

This guide will provide assistance and take you through the steps for using the service. The guide will cover:

This guide will provide assistance and take you through the steps for using the service. The guide will cover: The new e-statement service is a product which delivers statements of accounts in a secure manner. It uses the Mimecast CCM secure mail delivery solution. The process begins with Guaranty Trust Bank UK

More information

SJC Password Self-Service System FAQ 2012

SJC Password Self-Service System FAQ 2012 The San Jacinto College Password Self-Service System enables students to reset their password quickly and conveniently online. By utilizing this service, you can change your password and gain access to

More information

Outlook-How to Encrypt an Email 10/16/2014

Outlook-How to Encrypt an Email 10/16/2014 Section 1. How to Send an Encrypted E-mail from the Private Network/State Employee The following conditions must be true to send an encrypted e-mail using Proofpoint e-mail encryption: Your State Agency

More information

How to... Send and Receive Files with DropBox

How to... Send and Receive Files with DropBox How to... Send and Receive Files with DropBox Overview The Cornell DropBox is a secure method for transferring files to the people you specify. Files are encrypted during transport. DropBox can also be

More information

Encrypted Email Users Guide. Revised 6/8/2015

Encrypted Email Users Guide. Revised 6/8/2015 Encrypted Email Users Guide Revised 6/8/2015 Contents Encrypted email service overview Registering, activating and maintaining an account Online Help Accessing the encrypted email portal screens Downloading

More information

Xerox Email Encryption Recipient Guide. Cisco Registered Envelope Service

Xerox Email Encryption Recipient Guide. Cisco Registered Envelope Service Xerox Email Encryption Recipient Guide Cisco Registered Envelope Service 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United States

More information

Provider Express Obtaining Login Access. Information for Network Providers

Provider Express Obtaining Login Access. Information for Network Providers Provider Express Obtaining Login Access Information for Network Providers November 2013 Objectives This presentation will review the following features: How to Log in to Provider Express Retrieve a forgotten

More information

Secure File Transfer Guest User Guide Updated: 5/8/14

Secure File Transfer Guest User Guide Updated: 5/8/14 Secure File Transfer Guest User Guide Updated: 5/8/14 TABLE OF CONTENTS INTRODUCTION... 3 ACCESS SECURE FILE TRANSFER TOOL... 3 REGISTRATION... 4 SELF REGISTERING... 4 REGISTER VIA AN INVITATION SENT BY

More information

CHAPTER 6 PASSWORD RESET INSTRUCTIONS AND TIPS. Contents How to Reset Your SHIP NPR Password... 6 1 Password Tip Sheet... 6 5

CHAPTER 6 PASSWORD RESET INSTRUCTIONS AND TIPS. Contents How to Reset Your SHIP NPR Password... 6 1 Password Tip Sheet... 6 5 CHAPTER 6 PASSWORD RESET INSTRUCTIONS AND TIPS Contents How to Reset Your SHIP NPR Password... 6 1 Password Tip Sheet... 6 5 Chapter 6 Password Reset Instructions and Tips How to Reset Your SHIP NPR Password

More information

E Mail Encryption End User Guide

E Mail Encryption End User Guide E Mail Encryption End User Guide TABLE OF CONTENTS Why Use Email Encryption... 2 What is a Registered Envelope... 2 Features & Benefits... 2 Security Policies... 2 How to Compose and Send an Encrypted

More information

Stewart Secure Email User Guide. March 13, 2015

Stewart Secure Email User Guide. March 13, 2015 Stewart Secure Email User Guide March 13, 2015 Table of Contents Introduction... 1 What is secure email?... 1 Why secure email?... 1 What is personal, non-public information?... 1 How is my data protected?...

More information

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8 BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8 User Guide SWDT653811-793266-0827104650-001 Contents Getting started... 3 About messaging service plans for BlackBerry

More information

Virtual Code Authentication User s Guide. June 25, 2015

Virtual Code Authentication User s Guide. June 25, 2015 Virtual Code Authentication User s Guide June 25, 2015 Virtual Code Authentication User s Guide Overview of New Security Modern technologies call for higher security standards as practiced among many other

More information

State of Florida Drinking Water and Wastewater Inventory MOVEit DMZ Handbook Current as of: 5/27/2014

State of Florida Drinking Water and Wastewater Inventory MOVEit DMZ Handbook Current as of: 5/27/2014 State of Florida Drinking Water and Wastewater Inventory MOVEit DMZ Handbook INTRODUCTION The Department of Health (DOH) MOVEit DMZ application is utilized for secure transmission of large files (>8MB).

More information

Secure Email User Guide

Secure Email User Guide Secure Email User Guide Contents Secure email at HSBC. 2 About SecureMail... 2 Receiving a secure email sent via SecureMail 3 Opening a secure email sent via SecureMail... 4 Resetting your SecureMail password..

More information

EMAIL ENCRYPTION GUIDE

EMAIL ENCRYPTION GUIDE EMAIL ENCRYPTION GUIDE Introduction Page 2 What happens the first time I receive an encrypted email? Pages 3-5 What if I forget my password? Page 6 How do I change my password? Pages 7-9 What if I have

More information

How Do I Status My Vendor-Owned Resources in ROSS?

How Do I Status My Vendor-Owned Resources in ROSS? Page: 1 How Do I Status My Vendor-Owned Resources in ROSS? What do I need to do? How do I do that? 1. Request a new vendor user account Page 2. - Access the NAP environment at https://nap.nwcg.gov/nap/

More information

HertSFX. User Guide V2.04. Hertfordshire s Secure File Exchange Portal. (Jan 2014) HertSFX User Guide V2.04 Jan 2014 Page 1 of 17

HertSFX. User Guide V2.04. Hertfordshire s Secure File Exchange Portal. (Jan 2014) HertSFX User Guide V2.04 Jan 2014 Page 1 of 17 Hertfordshire s Secure File Exchange Portal User Guide V2.04 (Jan 2014) HertSFX User Guide V2.04 Jan 2014 Page 1 of 17 CONTENTS 1. About HertSFX... 3 2. HertSFX Limitations... 3 3. Getting Started... 3

More information

Portal Recipient Guide

Portal Recipient Guide Portal Recipient Guide Lindenhouse Software Limited 2015 Contents 1 Introduction... 4 2 Account Activation... 4 3 Forgotten Password... 9 4 Document signing... 12 5 Authenticating your Device & Browser...

More information

EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8

EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8 EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8 External Users Decrypting Secure Messages The following sections describe how users external to EJGH receive and decrypt secure messages. Reading

More information

Steps to Opening Your First Password-Protected Envelope

Steps to Opening Your First Password-Protected Envelope This section provides step-by-step instructions for opening a password-protected Registered Envelope for the first time. The steps demonstrate a typical scenario for a first-time recipient. Some of the

More information

Can I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.

Can I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID. How does Secure E-mail work? When an e-mail is initiated or responded to the secure e-mail algorithm will determine if the e-mail needs to be encrypted based on predefined criteria. If it meets the predefined

More information

Guide to Complete EIA SSO (Single Sign-On) Registration. 1. Open your Internet Browser, enter this address, and press Enter

Guide to Complete EIA SSO (Single Sign-On) Registration. 1. Open your Internet Browser, enter this address, and press Enter Guide to Complete EIA SSO (Single Sign-On) Registration 1. Open your Internet Browser, enter this address, and press Enter https://signon.eia.doe.gov/ssoserver/login 2. In the window that opens, bypass

More information

Bank of Hawaii Protecting Confidential Email

Bank of Hawaii Protecting Confidential Email 1 Bank of Hawaii Protecting Confidential Email Email is commonly used to transmit confidential information such as operational data, legal documents, or financial information. By default emails are sent

More information

Registering at the Securemail site

Registering at the Securemail site Registering at the Securemail site Before using the Secure Mail service for the first time, you must perform a one-time service registration by completing the following steps. 1. When a Secure Mail is

More information

Vodafone multitxt Outlook Mobile Services (OMS)

Vodafone multitxt Outlook Mobile Services (OMS) Vodafone multitxt Outlook Mobile Services (OMS) Microsoft Outlook 2007+ Mobile Service (OMS) Sending messages Replies FAQs 2 3 5 6 1 Microsoft Outlook 2007+ Mobile Service (OMS) Outlook Mobile Service

More information

Project Management Software Getting Started Guide

Project Management Software Getting Started Guide Project Management Software Getting Started Guide + For additional support e-mail us at support@smalljumps.com call us at 706-395-8400 Contents 1.1 Welcome Email... 3 1.2 Login Screen... 3 2.1 Home Toolbar...

More information

Vendor User Accounts managing your NAP User Account

Vendor User Accounts managing your NAP User Account This guide explains how to request and manage your NAP User Account so that you may access Web Status. Topics include: Reactivating an existing NAP User Account Requesting a NAP User Account Managing your

More information

Online Banking Guide. Your guide to safely. and securely managing. your accounts online.

Online Banking Guide. Your guide to safely. and securely managing. your accounts online. Online Banking Guide Your guide to safely and securely managing your accounts online. Table of contents LOGGING INTO ONLINE BANKING... Page 2 YOUR PASSWORD... Page 3 SETTING UP YOUR SECURITY IMAGE, PHRASE

More information

Requesting Materials in the LC Online Catalog (catalog.loc.gov)

Requesting Materials in the LC Online Catalog (catalog.loc.gov) Requesting Materials in the LC Online Catalog (catalog.loc.gov) Library of Congress registered readers may use the LC Online Catalog (catalog.loc.gov) to request materials from the Library s general collections.

More information

COST MANAGER A GUIDE TO PAPERLESS BILLING

COST MANAGER A GUIDE TO PAPERLESS BILLING COST MANAGER A GUIDE TO PAPERLESS BILLING DO YOU WANT ACCESS TO YOUR BILL ONLINE? If your company has switched to paperless bill, you can now have access to your bills online through Cost Manager, a web

More information

Georgia Department of Revenue. georgia tax center. Quick Reference Guide

Georgia Department of Revenue. georgia tax center. Quick Reference Guide georgia tax center Quick Reference Guide 1 Table of Contents 1. Forgot Password or Username.. 3 2. Create a New GTC Profile.. 4 3. Register a New GA Business.. 5 4. Add Accounts to my GTC Profile. 6 5.

More information

Frequently Asked Questions for the Department's elicensing System

Frequently Asked Questions for the Department's elicensing System Frequently Asked Questions for the Department's elicensing System Application/Renewal Status of License/Licensee Logging in and Registering Payments User ID and Password Technical Questions Contact Us

More information

Using etoken for Securing E-mails Using Outlook and Outlook Express

Using etoken for Securing E-mails Using Outlook and Outlook Express Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered

More information

Using the PeaceHealth Secure E-mail System

Using the PeaceHealth Secure E-mail System 1 PeaceHealth is using a Secure E-mail System that allows for secure E-mail communications between individuals with a PeaceHealth E-mail address and individuals with E-mail addresses outside the PeaceHealth

More information

Online Employment Application Guide

Online Employment Application Guide Online Employment Application Guide This guide describes how to apply for jobs using the LA Careers website. The process consists of the following steps: Create an Account Find Jobs Apply for a Job Create

More information

Using McAfee Quarantine Manager

Using McAfee Quarantine Manager Using McAfee Quarantine Manager McAfee Quarantine Manager provides a central point for users to analyze and act upon emails that have been quarantined because they have been identified as potential Spam.

More information

electronic Declaration of Interests System (edis) User Guide

electronic Declaration of Interests System (edis) User Guide electronic Declaration of Interests System (edis) User Guide Registering, logging on, and basic use Contents 1 Registering with the system... 2 2 Logging in and out... 4 2.1 Logging in... 4 2.2 Logging

More information

CSSEA Helpdesk User Guide

CSSEA Helpdesk User Guide CSSEA Helpdesk User Guide Contents I. Creating tickets... 3 1. Creating a New Ticket via Email... 3 a. Email format... 3 b. New ticket reply... 3 2. Creating a New ticket via the Website... 4 a. Browse

More information

DATA PROTECTION. OneWorld Encrypted Messages USER GUIDE

DATA PROTECTION. OneWorld Encrypted Messages USER GUIDE DATA PROTECTION OneWorld Encrypted Messages USER GUIDE Table of Contents 1 Why use Encrypted emails?... 3 2 Activation and Login... 4 2.1 Activating Your New OneWorld Encrypted Messages Account... 4 2.2

More information

CISCO SECURE MAIL. Internal User Guide. 1/20/14 Samson V.

CISCO SECURE MAIL. Internal User Guide. 1/20/14 Samson V. 1/20/14 Samson V. 1. When do I use this system? As part of The University of Colorado Denver HIPAA compliance initiatives, a system is now available that allows you to communicate securely via email with

More information

emobile Bulk Text User Guide Copyright Notice Copyright Phonovation Ltd

emobile Bulk Text User Guide Copyright Notice Copyright Phonovation Ltd emobile Bulk Text User Guide Copyright Notice Copyright Phonovation Ltd Important Notice: The Information contained in this document is subject to change without notice and should not be construed as a

More information

The Initial Registration Process. During the initial registration process, this guide assumes the user has been provided a login ID.

The Initial Registration Process. During the initial registration process, this guide assumes the user has been provided a login ID. eopf Account Guide The following processes are covered in this guide: Initial Registration Process (for new users) Forgotten Password Process Forgotten Login ID Process The Initial Registration Process

More information

ADP Secure Email Client User Guide

ADP Secure Email Client User Guide ADP Secure Email Client User Guide A Guide to Exchanging Secure Emails Using the Voltage SecureMail System Version 1.6 August 2014 ADP Secure Email Client User Guide August 2014 Copyright Information ADP

More information

Receiving the First Encrypted Email and Registration:

Receiving the First Encrypted Email and Registration: Alpine Bank values our customers and the need to keep their personal and account information safe. For that reason, we have teamed with Websense and Voltage Security to provide advanced email protection

More information