Email Encryption Procedures



Similar documents
CISCO SECURE MAIL. External User Guide. 1/15/15 Samson V.

Honeywell Secure External User Guide August 2013

Secure Actions for Recipients

E Mail Encryption End User Guide

Secure Messaging Service

Secure . Instructions for Use

FDIC Secure Procedures for External Users April 23, 2010

Figure 1. Deskguide Tumbleweed External User Instructions Page 1 of 5

P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems

Using Voltage Secur

Class Outline. Part 1 - Introduction Explaining Parts of an address Types of services Acquiring an account

ACS Encryption Recipient Guide

Receiving Secure s

Vanguard Secure Service (VSES) User Guide

TriCore Secure Web Gateway User Guide 1

How to Use Boston Private Bank s Secure Mail Service

Configuring an Client to Connect to CASS Mail Servers

Virtual Code Authentication User s Guide. June 25, 2015

Tutorial Details Product Demonstrated: X-301 Estimated Completion Time: 15 minutes

How To Send An Encrypted To The State From The Outside (Public)

Secure User Guide

Welcome to HomeTown Bank s Secure ! User Guide

UC Irvine Health Secure Mail Message Center

Secure with ZixCorp. Iowa Division of Banking

SEC External Guide for Using the Encryption Solution

MSGCU SECURE MESSAGE CENTER

Secure Mail Registration and Viewing Procedures

1 Outlook Web Access. 1.1 Outlook Web Access (OWA) Foundation IT Written approximately Dec 2010

Address: Username: Password: password

How To Encrypt An From A Cell Phone To A Pc Or Ipad (For A Partner) With A Cisco Encryption Solution (For Partners)

Children s Service. Secure Guide for external users

Mimecast Services for Outlook (MSO4)

MICROSOFT OUTLOOK 2003

Using etoken for Securing s Using Outlook and Outlook Express

Secure A Guide for Users

ConnectWise Total Control: Archiving Title: User Guide Version: 1.0 Creation Date: 19-July-2011 Last Updated: 19-July-2011

Using Internet or Windows Explorer to Upload Your Site

Encryption. Cisco Ironport. using. Click here to begin

Xerox Encryption Recipient Guide. Cisco Registered Envelope Service

Secur User Guide

Registering at the Secur site

U.S. Bank Secure Mail

Outlook Web Access (OWA) with Exchange Server 2007 (Windows version)

Barracuda Security Service User Guide

Quick-Start Guide

Secure User Guide Receiving Secure from Merchants Bank

Can I manually trigger secure to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

Use your UNNCNetID and password to log in. The first time you login to the system, you may receive the following screen:

Texas Medicaid & Healthcare Partnership (TMHP)

Using Rackspace Webmail

Business Internet service from Bell User Guide

Word Secure Messaging User Guide. Version 3.0

Proofpoint Encryption Manual. 18 July 2014

NeoMail Guide. Neotel (Pty) Ltd

10/28/2013. Partners Zixmail Web Portal. Provider Training. Let s Get Started!

SECURE COMMUNICATIONS PLAN Updated August 25, 2011

Encryption Recipient Guidelines

aprompt User Guide Setting up a Standard mailbox in Windows Mail

Sending an Encrypted/Unencrypted Message. Let's Begin: Log In and Set Up Security Questions. Create Additional ProMailSource Accounts:

Overview of Registered Envelopes. Registered Envelope Notification Message

Setup Corporate (Microsoft Exchange) . This tutorial will walk you through the steps of setting up your corporate account.

Student Mail Access. Introduction. Option One: Using an Client

Using the PeaceHealth Secure System

MSI Secure Mail Tutorial. Table of Contents

Secure Client User Guide Receiving Secure from Mercantile Bank

Encryption. How do I send my encryption key?

STUDENT Guide for Students

Updated: 7/10/2013 Author: Tim Unten

Toll Free: International:

HGC SUPERHUB HOSTED EXCHANGE

USC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8

Department of Alcohol & Drug Programs. Information Management Services Division (IMSD) ENCRYPTION INSTRUCTIONS

SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

Secure Management Guide. June 2008

MAC OS X 10.5 Mail Setup

Version 2.1.x. Barracuda Message Archiver. Outlook Add-In User's Guide

Outlook Web Access User Guide

BlackBerry Internet Service. Version: User Guide

aprompt User Guide Setting up a mailbox on the Apple IPhone 3G aprompt.co.uk User Guide Version 3.0 Advanced Mailbox on Apple IPhone 3G

Outlook Web Access Tipsheets

Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption!

Policy Based Encryption E. Administrator Guide

Office 365. Created: 06/04/2013 Revised: 08/20/2013. Outlook 365 Kindred Healthcare, Inc. All rights reserved. Logging In Page 1 of 15

Policy Based Encryption E. Administrator Guide

How to access and reply to an Egress Switch Secure free of charge. Opening a Switch Secure New User

Quick Set Up Guide for Users: Salesforce Authentication & Importing

How to sync Office 365 with Gmail

Update Instructions

Configuring Outlook to send mail via your Exchange mailbox using an alternative address

How To Set Up Your

Provincial User Manual

To configure Outlook Express for your InfoMetrics address:

EJGH Encryption User Tip Sheet of 8

Steps for: POP (Post Office Protocol) and IMAP (Internet Message Access Protocol) setup on MAC Platforms

USING OUTLOOK WEB ACCESS

Setting up your own Computer as an outgoing SMTP Mail Server

Login Instructions. 1. Type web URL into your browser s address bar.

Transcription:

Email Encryption Procedures Contents: I. Compose an Encrypted Message II. What Your Recipients Will Receive a. Registering a NewAccount b. Logging into a Created Account c. Reading and Replying III. Reading a Third-Party Reply

I. Compose an Encrypted Message To encrypt a new outgoing message, place the phrase [Encrypt] with the brackes at the very beginning of the Subject line, i.e.: [Encrypt] Your Subject. Your current message will be encrypted, as well as all further correspondence within the email chain and any attachments. Please inform your recipient of the procedures for reading the message; these are outlined in the next few pages. Only outgoing emails addessed to an external domain will be ecrypted (ex: name@gmail.com). Figure 1. Encrypting an outbound message from txstate.edu to a gmail.com address.

II. What Your Recipient Will Receive In order to read and reply to your email, your recipient must log into the Texas State secure mail server. Your third party will receive a link to the login page as shown in figure 2. To view the encrypted email on a mobile or smartphone device, please use the link in the body of the email otherwise use the attachment to view the message. Figure 2. Third-Party inbox receiving the encrypted message.

a. Registering a New Account If this is the first time your recipient is receiving an encrypted email from you, they will be prompted to register their account. As figure 3 shows, the email address will already be populated with the recipients email. Figure 3. Third-Party registering for a new account.

b. Logging into an Existing Account (Third-Party) If your recipient has already set up an account, they will be prompted with the following login screen to read the encrypted message: Figure 4. Logging in to read secure messages

c. Reading and Replying (Third-Party) After authenticating, your third-party recipient will be able to read and securely reply to your message.as you can see, the recipient cannot forward or add recipients to your encrypted email. The email can only be read and replied to. The reply will be encrypted. Figure 5. Reading an Encrypted Email (Third-Party)

c. Reading and Replying (Third-Party) When replying to the encrypted email, your third-party will compose the message and send it through the browser they are using to access the Texas State secure mail server website. Figure 6. Replying to an Encrypted Email (Third-Party)

III. Reading a Third-Party Reply from a Texas State Email Address You will receive an encrypted message in your inbox when your third-party replies to your email. Click on the link in the message to login to the Texas State secure mail server website and view the message. You will use your Texas State credentials (email address and password) to login to the site. Figure 7. Receiving a thir-party reply in your Texas State University email inbox

III. Reading a Third-Party Reply from a Texas State Email Address You will be prompted to login to view the encrypted reply. The email address field will be pre-populated with the original email address it was sent from. Figure 8. Log in from Texas State email address to view reply