ACS Encryption Recipient Guide

Size: px
Start display at page:

Download "ACS Email Encryption Recipient Guide"

Transcription

1 ACS Encryption Recipient Guide

2 ACS ENCRYPTION SERVICES / TRAINING AND AWARENESS ACS Encryption Recipient Guide Encryption Recipient Guide ACS A Xerox Company 2828 North Haskell Dallas, TX For Support Call Encryption Recipient Guide v2.1 1 ACS, A Xerox Company

3 Table of Contents INTRODUCTION... 3 OPENING AND READING AN ENCRYPTED SENDING AN ENCRYPTED TO ACS... 9 MANAGING ENCRYPTED MESSAGES Encryption Recipient Guide v2.1 2 ACS, A Xerox Company

4 Introduction Establishing secure lines of communication is a top priority at ACS. Every day we handle a multitude of sensitive and confidential information on behalf of our clients and employees. It is vital that we properly secure information that travels through our servers. The protection of Personal Information is critical to maintain our reputation and achieve our goals at ACS. Protecting information that has been entrusted to us is crucial to ACS business because data management is the core of so many of the services we offer. In addition to legal requirements, our customer contracts require that we use, handle, and store Personal Information in accordance with specific standards, which can differ widely from customer to customer with monetary, legal, and other penalties for failure to do so. As part of our work to continually provide world-class service and to assure our clients and employees that their Personal Information is safe, ACS Information Systems Security Services and ACS Messaging have worked together to provide encryption services to our clients and employees. Information that Requires Encryption ACS manages highly sensitive information for our employees, clients, and our clients customers and constituents. This information is known as Personal Information. [PI] Personal Information defined, is information in any form (written, oral or electronic) that could be used alone or in combination with other information to identify an individual. Some information, such as a Social Security Number, can be used alone to identify an individual, and is therefore considered Personal Information. Other types of information, such as a zip code, must be combined with other data to identify an individual in order to be considered Personal Information. There are a variety of types of data that, alone or in combination with other information, can be used to create Personal Information. These include, but are not limited to: An individual s name, address, zip code, address, telephone and fax numbers All dates related to an individual (e.g., birth date, admission date) Health-related information of any kind, including providers, treatment, insurance coverage, and payment information Account or card numbers identifying a specific individual's account, including medical, health care, and financial accounts Tax ID and Social Security Number, driver s license and license plate numbers, photograph, or biometric identifier User IDs, passwords, and logins Employment and education records Compensation and benefits information Financial Information for both ACS and our clients: this includes internal accounting and financial reporting data, credit card numbers, bank account information, mortgage information, client finance and accounting information, etc. Encryption Recipient Guide v2.1 3 ACS, A Xerox Company

5 Opening and Reading an Encrypted 1. Open your message entitled ACS Secured Message. 2. Click on the link provided to read the message. ACS Secured Message From: Add contact Sent: Fri 2/01/08 1:26 PM To: You have received an ACS Secured Message from: Employee, ACS To read this message securely, please click this link: CONFIDENTIALITY NOTICE: This message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply and destroy all copies of the original message. 3. If you are a first time user, you will be prompted to create a passphrase. This allows access to a secure Inbox where you can read the decrypted s. Click on Continue to proceed. Encryption Recipient Guide v2.1 4 ACS, A Xerox Company

6 Opening and Reading an Encrypted (continued) On the Message Delivery Options page, you will be prompted to select the way you want to receive future s from ACS. At the present time the PGP Web Messenger is the only option and is already selected for you. (This is for screen is for first time users only.) 4. Click the Choose Option button. NOTE: It is recommended that you check the box labeled: Save a copy of all outgoing messages in my Sent Mail folder. Encryption Recipient Guide v2.1 5 ACS, A Xerox Company

7 Opening and Reading an Encrypted (continued) Please Note the Following with Regards to Login: If you have already set up your account you will only be asked to enter your passphrase. If you have previously logged in and forgot you passphrase you will receive the following screen; or if you log into Web Messenger directly (log out and log back in) you will also receive the following screen. If you receive this screen Type your Address and Passphrase on the PGP Web Messenger login page. 5. Click the Login button. Encryption Recipient Guide v2.1 6 ACS, A Xerox Company

8 Opening and Reading an Encrypted (continued) You are directed to your personalized Secure Inbox as shown below. If there are multiple messages, the PGP Universal server displays all messages. 6. Click on the desired message from the list. Once a message is open, you can use the tool bar to Reply, Reply to All, and Download Attachments or Delete. Note: Recipients can reply back to a secured as long as: 1. The reply is sent to those listed as recipients on the The reply is sent to an address that is part of a managed domain (currently the managed domain consists of addresses containing asc-inc.com, acs-hro.com and buckconsultants.com) Encryption Recipient Guide v2.1 7 ACS, A Xerox Company

9 Opening and Reading an Encrypted (continued) 7. Click the Logout button, once you have completed your tasks. If the recipient attempts to send an to someone who is not already carbon-copied on the or is not part of the managed domain, the following error message will appear: Note: Please be aware that attachments do not appear with the paperclip icon as they do in Outlook. Recipients of encrypted must scroll down to the end of the message to confirm that an attachment has been included with the . Encryption Recipient Guide v2.1 8 ACS, A Xerox Company

10 Sending an Encrypted to ACS You can send a secure to ACS using Web Messenger. With this procedure, s originating from the Client or Vendor site may only be sent to persons with managed ACS domains listed on the PGP server. This typically includes s sent to recipients with the following domain addresses as well as some others: acs-inc.com acs-hro.com buckconsultants.com To compose an encrypted message: 1. Click the Compose button from the Inbox screen. Complete the fields as normal. 2. Click the Send button. Note: DO NOT SEND s to a distribution list. The PGP server is not designed to send encrypted messages to distribution lists. The name(s) of each recipient must be entered individually. Note: Your session will time-out after 15 minutes of inactivity. You will have to log in again and compose your entire . Encryption Recipient Guide v2.1 9 ACS, A Xerox Company

11 Managing Encrypted Messages Users of encryption who have their system set up to automatically save outgoing messages in the Sent folder can review and manage these messages by selecting the Sent button from any screen. When this is done, the following screen will appear: By selecting the desired sent message, you can display it for review and/or deletion. Remember the amount of memory allocated for messages is not very large, so please keep the number of messages saved in the Inbox and Sent box to a minimum. Encryption Recipient Guide v ACS, A Xerox Company

Xerox Email Encryption Recipient Guide. Cisco Registered Envelope Service

Xerox Email Encryption Recipient Guide. Cisco Registered Envelope Service Xerox Email Encryption Recipient Guide Cisco Registered Envelope Service 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United States

More information

Honeywell Secure Email External User Guide August 2013

Honeywell Secure Email External User Guide August 2013 Honeywell Secure Email External User Guide August 2013 PAGE: 1 of 14 Chapter No Table of Content Page No 1 Introduction 3 2 Using the Honeywell Secure Email Interface 3 3 Sending an Encrypted Email to

More information

Secure E-Mail Management Guide. June 2008

Secure E-Mail Management Guide. June 2008 Secure E-Mail Management Guide June 2008 What are Paychex Secure Messages? To enhance the security of client and vendor data, Paychex created the Paychex Secure E-mail Message Center, a Web site hosted

More information

EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8

EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8 EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8 External Users Decrypting Secure Messages The following sections describe how users external to EJGH receive and decrypt secure messages. Reading

More information

Background Information

Background Information User Guide 1 Background Information ********************************Disclaimer******************************************** This is a government system intended for official use only. Using this system

More information

Can I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.

Can I manually trigger secure e-mail to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID. How does Secure E-mail work? When an e-mail is initiated or responded to the secure e-mail algorithm will determine if the e-mail needs to be encrypted based on predefined criteria. If it meets the predefined

More information

CISCO SECURE MAIL. External User Guide. 1/15/15 Samson V.

CISCO SECURE MAIL. External User Guide. 1/15/15 Samson V. 1/15/15 Samson V. 1. These instructions are for users who reside outside the University of Colorado Denver that receive encrypted emails from faculty or staff of UC Denver. As a part of our HIPAA compliance

More information

Outlook Web Access (OWA) with Exchange Server 2007 (Windows version)

Outlook Web Access (OWA) with Exchange Server 2007 (Windows version) Outlook Web Access (OWA) with Exchange Server 2007 (Windows version) 1. Login into your Baylor email account via a web browser such as Internet Explorer, Fire Fox, or Netscape. The web URL is still http://mail.baylor.edu/

More information

Secure Email - Customer User Guide How to receive an encrypted email

Secure Email - Customer User Guide How to receive an encrypted email How to receive an encrypted email This guide has been developed for customers/suppliers of Glasgow City Council who are due to receive sensitive information from us. It will explain how to use our secure

More information

SECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011

SECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011 SECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011 Introduction In October, 2008, the Division of Welfare and Supportive Services (DWSS) announced the introduction of secure e-mail through ASM 17-08.

More information

U.S. Bank Secure Mail

U.S. Bank Secure Mail U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email

More information

Vanguard Secure E-Mail Service (VSES) User Guide

Vanguard Secure E-Mail Service (VSES) User Guide Vanguard Secure E-Mail Service (VSES) User Guide Information Security Department January 8, 2013 Contents Guide for Users of Secure E-Mail From Vanguard 1 View Secure E-Mail 1 New Registration 3 Compose

More information

P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems

P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems Procedure P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems P309 - Page: Page 1 of 12 Date of Release: 23 February 2011 Status: Final Document Reference: Title: P309 Release Number:

More information

Using Voltage SecureMail

Using Voltage SecureMail Using Voltage SecureMail Using Voltage SecureMail Desktop Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending a secure email as easy as sending it without encryption.

More information

TriCore Secure Web Email Gateway User Guide 1

TriCore Secure Web Email Gateway User Guide 1 TriCore Secure Web Email Gateway User Guide This document provides information about TriCore Secure Web Email Gateway. This document is for users who are authorized to send and receive encrypted email

More information

Page 1 Rev Date: February 2010. User Manual for Encrypted Email Services

Page 1 Rev Date: February 2010. User Manual for Encrypted Email Services Page 1 User Manual for Encrypted Email Services Instructions for Using Encrypted Email Services This document is being provided to assist you in opening encrypted emails sent from Century Bank. The following

More information

Stewart Secure Email User Guide. March 13, 2015

Stewart Secure Email User Guide. March 13, 2015 Stewart Secure Email User Guide March 13, 2015 Table of Contents Introduction... 1 What is secure email?... 1 Why secure email?... 1 What is personal, non-public information?... 1 How is my data protected?...

More information

Jumble for Microsoft Outlook

Jumble for Microsoft Outlook Jumble for Microsoft Outlook Jumble is a zero knowledge, end- to- end email encryption solution that integrates with existing email platforms. Jumble integrates at the email client level and removes the

More information

Using etoken for Securing E-mails Using Outlook and Outlook Express

Using etoken for Securing E-mails Using Outlook and Outlook Express Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered

More information

4. Click Next and then fill in your Name and E-mail address. Click Next again.

4. Click Next and then fill in your Name and E-mail address. Click Next again. NOTE: Before installing PGP, Word needs to be disabled as your editor in Outlook. In Outlook, go to Tools: Options: Mail Format and uncheck Use Microsoft Office Word to edit e-mail messages. Failure to

More information

Receiving Secure Email from Citi For External Customers and Business Partners

Receiving Secure Email from Citi For External Customers and Business Partners Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure

More information

Welcome to HomeTown Bank s Secure E-mail! User Guide

Welcome to HomeTown Bank s Secure E-mail! User Guide Welcome to HomeTown Bank s Secure E-mail! User Guide To access the secure email message center, click the Secure Email link on the www.htbmn.com main web page. Select whether you are a new user of the

More information

Instructions For Opening UHA Encrypted Email

Instructions For Opening UHA Encrypted Email Receiving Encrypted Email You have received a secure, encrypted message from UHA. The message will contain the following notice and an attachment named SecureMessageAtt.hml. The attachment is shown circled

More information

Division of School Facilities OUTLOOK WEB ACCESS

Division of School Facilities OUTLOOK WEB ACCESS Division of School Facilities OUTLOOK WEB ACCESS New York City Department of Education Office of Enterprise Development and Support Applications Support Group 2011 HELPFUL HINTS OWA Helpful Hints was created

More information

SECURE Email User Guide

SECURE Email User Guide SECURE Email User Guide Receiving SECURE Email from Starion Financial Starion Financial is now offering an enhanced email encryption tool, IronPort PXE, which enables the email communication of sensitive

More information

Email Encryption Procedures

Email Encryption Procedures Email Encryption Procedures Contents: I. Compose an Encrypted Message II. What Your Recipients Will Receive a. Registering a NewAccount b. Logging into a Created Account c. Reading and Replying III. Reading

More information

Children s Service. Secure Email Guide for external users

Children s Service. Secure Email Guide for external users Children s Service Secure Email Guide for external users Contents 1. Secure email introduction 2. receiving a secure email for the first time 3. Logging on to the secure email portal 4. Changing your password

More information

SECURE EMAIL USER GUIDE OUTLOOK 2000

SECURE EMAIL USER GUIDE OUTLOOK 2000 WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP

More information

How To Send An Encrypted Email To The State From The Outside (Public)

How To Send An Encrypted Email To The State From The Outside (Public) Section 1. How to Send an Encrypted E-mail from the Private Network/State Employee The following conditions must be true to send an encrypted e-mail using Proofpoint e-mail encryption: Your State Agency

More information

E-mail Encryption. How do I send my e-mail encryption key?

E-mail Encryption. How do I send my e-mail encryption key? E-mail Encryption SecurenCrypt e-mail encryption was designed to work as a plug-in with Microsoft Outlook. The following instructions are geared toward users encrypting e-mail with Outlook. However, throughout

More information

Secure E-mail FAQs 1

Secure E-mail FAQs 1 Secure E-mail FAQs 1 P age Table of Contents Secure E-Mail Overview... 3 Options for viewing secure e-mail... 3 Delivery Option Decision Tree... 4 Before you start using Secure E-mail... 4 To use a PGP

More information

Directory and Messaging Services Enterprise Secure Mail Services

Directory and Messaging Services Enterprise Secure Mail Services Title: Directory and Messaging Services Enterprise Secure Mail Services Enterprise Secure Mail Services for End Users Attention: Receivers of Secure Mail Retrieval of Secure Mail by the Recipient Once

More information

smarshencrypt User s Guide

smarshencrypt User s Guide Versions Addressed: smarshencrypt 2.0 Document Updated: 7/30/2010 Copyright 2010 Smarsh, Inc. All rights Purpose: This document will guide the end user in receiving and viewing smarshencrypt secure messages.

More information

Using Entrust certificates with Microsoft Office and Windows

Using Entrust certificates with Microsoft Office and Windows Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark

More information

E-mail Encryption Recipient Guidelines

E-mail Encryption Recipient Guidelines E-mail Encryption Recipient Guidelines Canadian Western Bank Group Human Resources Department November 1, 2013 This reference guide was developed for training and reference use only. Any discrepancies

More information

Receiving Secure Emails

Receiving Secure Emails Receiving Secure Emails This document explains how you can access emails that have been sent to you through CyberArk s Secure Email system in several simple steps. When you receive a secure email, you

More information

1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6

1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6 MailTrack How To Document 27 March 2014 Table of Contents 1. How to Register... 2 2. Forgot Password... 4 3. Login to MailTrack Webmail... 5 4. Accessing MailTrack message Centre... 6 5. Creating a MailTrack

More information

INET1005 May 2009 Getting Started with MyUH Email

INET1005 May 2009 Getting Started with MyUH Email INET1005 May 2009 Getting Started with MyUH Email Introduction Introduction... 1 Overview... 1 My E-mail Inbox Channel... 2 MyUH E-mail Center... 3 Address Book... 5 Email Options... 6 Help... 6 Exit...

More information

E Mail Encryption End User Guide

E Mail Encryption End User Guide E Mail Encryption End User Guide TABLE OF CONTENTS Why Use Email Encryption... 2 What is a Registered Envelope... 2 Features & Benefits... 2 Security Policies... 2 How to Compose and Send an Encrypted

More information

BlackBerry Internet Service. Version: 4.5.1. User Guide

BlackBerry Internet Service. Version: 4.5.1. User Guide BlackBerry Internet Service Version: 4.5.1 User Guide Published: 2014-05-22 SWD-20140522173857703 Contents 1 Getting started...7 About the messaging service plans for the BlackBerry Internet Service...7

More information

How To Set Up Your Email

How To Set Up Your Email How To Set Up Your Email Contents Page Microsoft Outlook 1 Outlook Express 6 7 Webmail (this is for those who do not use an email programme) 12 Windows Live Mail 22 Mozilla Thunderbird 26 Windows Mail

More information

Secure Email Client Guide

Secure Email Client Guide PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing

More information

Secure Email User Guide

Secure Email User Guide Secure Email User Guide Contents Secure email at HSBC. 2 About SecureMail... 2 Receiving a secure email sent via SecureMail 3 Opening a secure email sent via SecureMail... 4 Resetting your SecureMail password..

More information

Initial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion

Initial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion Initial Setup of Microsoft Outlook Concept This document describes the procedures for setting up the Microsoft Outlook email client to download messages from Google Mail using Internet Message Access Protocol

More information

Introduction to Webmail for staff

Introduction to Webmail for staff Introduction to Webmail for staff Contents: Starting Webmail Login screen Your inbox Composing a message Attachments Replying to emails Forwarding a message Address book Deleting messages Automatic email

More information

Secure Email User Guide. Guidance for Recipients of Secure Email Messages from Lloyds Banking Group

Secure Email User Guide. Guidance for Recipients of Secure Email Messages from Lloyds Banking Group Guidance for Recipients of Secure Email Messages from Lloyds Banking Group Version: 1.3 Last updated: 14/04/2016 1 Introduction This user guide is intended for third party email users users who receive,

More information

Orbital ATK Secure Email: Receiving Encrypted Messages. Why Orbital ATK Secure Email? Initial Email: Orbital ATK Secure Email Notification

Orbital ATK Secure Email: Receiving Encrypted Messages. Why Orbital ATK Secure Email? Initial Email: Orbital ATK Secure Email Notification Orbital ATK Secure Email: Receiving Encrypted Messages This document is intended for Orbital ATK Employees, Partners & Clients as an introduction & instructional user guide for Orbital ATK Secure Email.

More information

How to access your email via Outlook Web Access

How to access your email via Outlook Web Access How to access your email via Outlook Web Access 1) Open your internet browser and type in the following address: www.law.miami.edu * Aol users must minimize their browser and use Internet Explorer 6.0+

More information

How To Use Webmail. Guiding you through the Universities online email

How To Use Webmail. Guiding you through the Universities online email How To Use Webmail Guiding you through the Universities online email Table of Contents LOGGING ON...2 VIEWING MESSAGES...2 SENDING A MESSAGE...3 Using the University s Address Book...3 To send a message

More information

How to Send an Encrypted Email via KDADS' Outlook Client or Outlook Web Application

How to Send an Encrypted Email via KDADS' Outlook Client or Outlook Web Application How to Send an Encrypted Email via KDADS' Outlook Client or Outlook Web Application In order to ensure Personal Health Information (PHI) and Personally Identifiable Information (PII) is protected, KDADS

More information

Word Secure Messaging User Guide. Version 3.0

Word Secure Messaging User Guide. Version 3.0 Word Secure Messaging User Guide Version 3.0 Copyright 2007-2013 WordSecure, LLC. All Rights Reserved. Page 1 of 7 1. Introduction Word Secure Messaging is a program that allows you to exchange encrypted

More information

Using your Encrypted BlackBerry

Using your Encrypted BlackBerry Using your Encrypted BlackBerry How do I change the Language on my BlackBerry? 1. On the Home screen or in a folder, click the Options icon. 2. Click Typing and Input > Language. 3. To change the display

More information

EMAIL: How to setup Outlook and Outlook Web Access (OWA) to give a send receipt and a read receipt (Options)

EMAIL: How to setup Outlook and Outlook Web Access (OWA) to give a send receipt and a read receipt (Options) EMAIL: How to setup Outlook and Outlook Web Access (OWA) to give a send receipt and a read receipt (Options) Versions: Outlook 2003 and OWA 2003 Purpose: To show how a user can setup an email message such

More information

Archive Add-in User Guide

Archive Add-in User Guide Archive Add-in User Guide RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE OF PROPRIETARY INFORMATION Copyright 2011 McAfee, Inc. This document contains information that is proprietary and confidential to

More information

Recalling A Sent Message in Outlook 2010

Recalling A Sent Message in Outlook 2010 Recall or replace an email message that you sent The recall feature in Microsoft Outlook tries to stop delivery and, optionally, replace an email message that you have already sent to another Microsoft

More information

Secure Email A Guide for Users

Secure Email A Guide for Users Secure Email A Guide for Users October 14, 2013 10/13 TABLE OF CONTENTS USING THE SYSTEM FOR THE FIRST TIME... 3 EMAIL NOTIFICATION OF SECURE INFORMATION... 3 GETTING REGISTERED ON THE SYSTEM... 4 ACCOUNT

More information

Initial Setup of Microsoft Outlook with Google Apps Sync for Windows 7. Initial Setup of Microsoft Outlook with Google Apps Sync for Windows 7

Initial Setup of Microsoft Outlook with Google Apps Sync for Windows 7. Initial Setup of Microsoft Outlook with Google Apps Sync for Windows 7 Microsoft Outlook with Initial Setup of Concept This document describes the procedures for setting up the Microsoft Outlook email client to download messages from Google Mail using Internet Message Access

More information

Secure Email User Guide. PGP (Pretty Good Privacy)

Secure Email User Guide. PGP (Pretty Good Privacy) Secure Email User Guide PGP (Pretty Good Privacy) 1 Contents 1 Introduction... 3 2 PGP Web Messenger... 4 3 Enrolling as a PGP Web Messenger User... 4 4 How to use PGP Web Messenger... 6 4.1 Mailbox access...

More information

Department of Alcohol & Drug Programs. Information Management Services Division (IMSD) EMAIL ENCRYPTION INSTRUCTIONS

Department of Alcohol & Drug Programs. Information Management Services Division (IMSD) EMAIL ENCRYPTION INSTRUCTIONS Department of Alcohol & Drug Programs (IMSD) EMAIL ENCRYPTION INSTRUCTIONS July 1, 2010 Why Do We Need Email Encryption? Code of Regulations, Title 45, Subtitle A, Part 164 The Health Insurance Portability

More information

Secure Mail Registration and Viewing Procedures

Secure Mail Registration and Viewing Procedures Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email

More information

Secure Email Actions for Email Recipients

Secure Email Actions for Email Recipients Secure Email Actions for Email Recipients Actions for Email Recipients The recipient cannot forward encrypted email outside the secure system. Each email will only be available to the recipient for 30

More information

Using the PeaceHealth Secure E-mail System

Using the PeaceHealth Secure E-mail System 1 PeaceHealth is using a Secure E-mail System that allows for secure E-mail communications between individuals with a PeaceHealth E-mail address and individuals with E-mail addresses outside the PeaceHealth

More information

Wakefield Council Secure email and file transfer User guide for customers, partners and agencies

Wakefield Council Secure email and file transfer User guide for customers, partners and agencies Wakefield Council Secure email and file transfer User guide for customers, partners and agencies The nature of the work the council carries out means that we often deal with information that is sensitive

More information

FDIC Secure Email Procedures for External Users April 23, 2010

FDIC Secure Email Procedures for External Users April 23, 2010 FDIC Secure Email Procedures for External Users April 23, 2010 This document contains information proprietary to the Federal Deposit Insurance Corporation. Table of Contents 1. Introduction...2 2. Receiving

More information

Using the Web email service

Using the Web email service Using the Web email service This booklet describes the web based email service used by Sandwell schools. The web based email service was introduced in January 2005 to replace an earlier webmail system.

More information

This document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee.

This document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee. Email Encryption User Guide Sterne Agee is committed to the security of your information. We have implemented Cisco Email Encryption to secure email communication so that only you can open it.* Questions?

More information

File Share Service User guide

File Share Service User guide File Share Service User guide Version: 2.0 Written by: Sriram Rao Last Modified: 03/16/2012 1 Index Index... 2 Overview... 3 Change Log... 4 Login Instructions... 5 Searching files by name or content...

More information

MSGCU SECURE MESSAGE CENTER

MSGCU SECURE MESSAGE CENTER MSGCU SECURE MESSAGE CENTER Welcome to the MSGCU Secure Message Center. Email is convenient, but is it secure? Before reaching the intended recipient, email travels across a variety of public servers and

More information

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8 BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8 User Guide SWDT653811-793266-0827104650-001 Contents Getting started... 3 About messaging service plans for BlackBerry

More information

ADP Secure Email Client User Guide

ADP Secure Email Client User Guide ADP Secure Email Client User Guide A Guide to Exchanging Secure Emails Using the Voltage SecureMail System Version 1.0 July 2008 2008 ADP, Inc. Copyright Information ADP provides this publication as is

More information

I. Configuring Digital signature certificate in Microsoft Outlook 2003:

I. Configuring Digital signature certificate in Microsoft Outlook 2003: I. Configuring Digital signature certificate in Microsoft Outlook 2003: In order to configure Outlook 2003 to use the new message security settings please follow these steps: 1. Open Outlook. 2. Go to

More information

Class Outline. Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account

Class Outline. Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account EMAIL Basics Class Outline Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account Part 3 Managing Your Messages Deleting messages The Trash

More information

Nationstar Mortgage Secure Email Client User Guide

Nationstar Mortgage Secure Email Client User Guide Nationstar Mortgage Secure Email Client User Guide A Guide to Exchanging Secure Emails Using the Nationstar Mortgage Secure Email Message Center Version 1.0 July 2010 1 Nationstar Public Copyright Information

More information

USER GUIDE. This user guide covers the following topics: Getting to know the email interface. Attaching a document to an email

USER GUIDE. This user guide covers the following topics: Getting to know the email interface. Attaching a document to an email LGfL EMAIL USER GUIDE This user guide covers the following topics: Logging on Getting to know the email interface Getting new messages Reading messages Writing a new message Attaching a document to an

More information

Baylor Secure Messaging. For Non-Baylor Users

Baylor Secure Messaging. For Non-Baylor Users Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7

More information

Registering at the Securemail site

Registering at the Securemail site Registering at the Securemail site Before using the Secure Mail service for the first time, you must perform a one-time service registration by completing the following steps. 1. When a Secure Mail is

More information

10/28/2013. Partners Zixmail Web Portal. Provider Training. Let s Get Started!

10/28/2013. Partners Zixmail Web Portal. Provider Training. Let s Get Started! Partners Zixmail Web Portal Provider Training Let s Get Started! 1 Setting Up Your Partners Zixmail Web Portal There are two methods to begin this process. Option #1 Use the link on the Partners Provider

More information

Reading mail via the Web on Mail.uh.edu

Reading mail via the Web on Mail.uh.edu Reading mail via the Web on Mail.uh.edu Connecting to mail via the Web Once you have obtained your userid and password, go to the Web Site http://mail.uh.edu You will see the following screen: Click Log

More information

Division of Public and Behavioral Health (DPBH) INTRODUCTION TO SECURE EMAIL. Updated October 2015

Division of Public and Behavioral Health (DPBH) INTRODUCTION TO SECURE EMAIL. Updated October 2015 What is secure email? Division of Public and Behavioral Health (DPBH) INTRODUCTION TO SECURE EMAIL Updated October 2015 Secure email ensures that Personal Information (PI), Personal Health Information

More information

S-Doc User Guide. Instructions on using the Secure Document Online Courier with the CAAT Pension Plan. September 2012

S-Doc User Guide. Instructions on using the Secure Document Online Courier with the CAAT Pension Plan. September 2012 S-Doc User Guide Instructions on using the Secure Document Online Courier with the CAAT Pension Plan Secure solution provided by Accellion September 2012 S E C U R E C O L L A B O R A T I O N U S E R G

More information

PREMIUM MAIL ADMINISTRATOR GUIDE

PREMIUM MAIL ADMINISTRATOR GUIDE PREMIUM MAIL ADMINISTRATOR GUIDE WHO THIS USER GUIDE IS FOR This document is for the: Administrator of the BigPond Premium Mail service. Users who have purchased the Solo Manager or a Solo Manager Plus

More information

USC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9

USC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9 About ShareFile When you wish to send someone a file or need a file from someone else, your best option is to use ShareFile. It not only provides increased security by automatically encrypting files but

More information

Mimecast Services for Outlook (MSO4)

Mimecast Services for Outlook (MSO4) Mimecast Services for Outlook (MSO4) End User Quick Start Guide for Outlook 2010/2013 Mimecast Services for Outlook (MSO 4) is a software application that integrates with your Microsoft Outlook. Once installed,

More information

USING YOUR LOGIX HOSTED E-MAIL

USING YOUR LOGIX HOSTED E-MAIL USING YOUR LOGIX HOSTED E-MAIL Who needs this User Guide? Your company s employee commonly referred to as the E-mail Administrator who will be responsible for administering the LOGIX hosted E-mail. Why

More information

PREMIUM MAIL USER GUIDE

PREMIUM MAIL USER GUIDE PREMIUM MAIL USER GUIDE WHO THIS USER GUIDE IS FOR This document is for users of BigPond Premium Mail. It describes the features of BigPond Premium Mail from a user s perspective. It contains: A general

More information

SecureMail User Guide

SecureMail User Guide SecureMail User Guide Contents Secure email at HSBC. 2 About SecureMail... 2 Receiving a secure email sent via SecureMail 3 Opening a secure email sent via SecureMail... 4 Using SecureMail to reply to

More information

Webmail Access. Contents

Webmail Access. Contents Webmail Access Contents Introduction... 2 Client Webmail and password settings... 2 OPTION1 : Log onto Webmail... 2 Webmail Control Panel... 3 Read Your Email Online... 4 OPTION 2: Configure the local

More information

Cryptshare for Outlook User Guide

Cryptshare for Outlook User Guide Cryptshare for Outlook User Guide V1.6.2 Befine Solutions AG Werthmannstr. 15 79098 Freiburg i. Br. Germany Web: https://www.cryptshare.com E-Mail: info@cryptshare.com Tel.: +49 761 389 13 0 Fax: +49 761

More information

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies

More information

Quick Start : i-fax User Guide

Quick Start : i-fax User Guide Quick Start : i-fax User Guide Introduction Welcome to the i-fax System User Guide! This manual will help new users navigate i-fax System and perform common tasks. This manual is task-oriented. You will

More information

Secure Email Client User Guide Receiving Secure Email from Mercantile Bank

Secure Email Client User Guide Receiving Secure Email from Mercantile Bank Receiving Secure Email from Contents This document provides a brief, end-user overview of the Secure Email system which has been implemented by. Why Secure Email? When someone sends you an email, the email

More information

Recipients Guide for Email Encryption Version 1.2

Recipients Guide for Email Encryption Version 1.2 Recipients Guide for Email Encryption Version 1.2 Document Location n/a Copies can be requested from the IT Dept 01603 50 8622 Revision Previous Revision by Summary of Changes Version date revision date

More information

Initial Setup of Mozilla Thunderbird with IMAP for Windows 7

Initial Setup of Mozilla Thunderbird with IMAP for Windows 7 Initial Setup of Mozilla Thunderbird Concept This document describes the procedures for setting up the Mozilla Thunderbird email client to download messages from Google Mail using Internet Message Access

More information

DATA PROTECTION. OneWorld Encrypted Messages USER GUIDE

DATA PROTECTION. OneWorld Encrypted Messages USER GUIDE DATA PROTECTION OneWorld Encrypted Messages USER GUIDE Table of Contents 1 Why use Encrypted emails?... 3 2 Activation and Login... 4 2.1 Activating Your New OneWorld Encrypted Messages Account... 4 2.2

More information

Borough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments

Borough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments Borough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments V8 Contents What is Encryption?...3 Why do I need to know about it?...3 How do I use it?...3 What

More information

1. Navigate to Control Panel and click on User Accounts and Family Safety. 2. Click on User Accounts

1. Navigate to Control Panel and click on User Accounts and Family Safety. 2. Click on User Accounts This document will guide you through setting up your outgoing server (SMTP) Microsoft Outlook and Windows Live Mail. There is also a section below that guides you through the manual configuration of your

More information

Secure Email Recipient Guide

Secure Email Recipient Guide Secure Email Recipient Guide Contents How to open your first Encrypted Message.... 3 Step-by-Step Guide to Opening Your First Envelope... 3 Step One:... 3 Step Two:... 4 Step Three:... 4 Step Four:...

More information

Secure Email User Guide

Secure Email User Guide Secure Email User Guide Transport Layer Security (TLS) Pretty Good Privacy (PGP) PDF Messenger 1 Contents 1 Introduction... 3 2 Transport Layer Security (TLS).4 3 Pretty Good Privacy (PGP).5 4 PDF Messenger...

More information

Online Banking Quick Reference Guide

Online Banking Quick Reference Guide 1 Page 2 Set Up and Access to Online Banking 2 How do I set up Online Banking? 2 How do I sign in to Online Banking? Online Banking Quick Reference Guide 3 Security 3 How do I change User ID? 3 What should

More information