Business Procedures: Send Secure Emails Created: 02-25-2014 Updated: 04-15-2014



Similar documents
Employer s Reference Manual Chapter 19. Public School Employees Retirement System. Employers Reference Manual Chapter 19 Revised: 2/26/2015 i

Department of Alcohol & Drug Programs. Information Management Services Division (IMSD) ENCRYPTION INSTRUCTIONS

Secure Client User Guide Receiving Secure from Mercantile Bank

Baylor Secure Messaging. For Non-Baylor Users

TriCore Secure Web Gateway User Guide 1

CLIENT PORTAL USER GUIDE

Version 4 Revised 5/2015

GDC4S Dropbox User Guide

Secure Mail Registration and Viewing Procedures

Secure - Customer User Guide How to receive an encrypted

How To Open An Encrypted

INFORMATION SYSTEMS SERVICE NETWORKS AND TELECOMMUNICATIONS SECTOR. User Guide for the RightFax Fax Service. Web Utility

FDIC Secure Procedures for External Users April 23, 2010

HOW TO USE OIT VIA THE WEB

USC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9

NC State College GroupWise V.7 WebAcess Employee System

How to Use Boston Private Bank s Secure Mail Service

Can I manually trigger secure to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.

Constant Contact User Manual

Directory and Messaging Services Enterprise Secure Mail Services

SchoolMessenger for iphone

Wakefield Council Secure and file transfer User guide for customers, partners and agencies

Utilizing SASED OneDrive Cloud Storage

Schools Remote Access Server

Secure Actions for Recipients

MUTUAL OF OMAHA SECURE SYSTEM CLIENT/PARTNER USER GUIDE

How To Encrypt An From A Cell Phone To A Pc Or Ipad (For A Partner) With A Cisco Encryption Solution (For Partners)

Using the SB Partners Client Web Portal

FTP-Stream Module: InstantShare End User Guide

Appendix A: Encrypting a File and / or Message

This document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee.

Secure Message Center User Guide

Direct Mail Training Manual

Secure Messaging (Direct) Training Manual

Working with H-drive, I-drive, and DropBox Files Online

Hallpass Instructions for Connecting to Mac with a Mac

Word Secure Messaging User Guide. Version 3.0

Citrus Valley Health Partners. Web Outlook User Guide. Table of Contents

1. Right click using your mouse on the desktop and select New Shortcut.

THE CHILDREN S HEALTH NETWORK CONTRACTING TOOL TRAINING MANUAL

Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption!

Bank of Hawaii Protecting Confidential

Contents LOGIN. Order an Official Transcript National Student Clearinghouse Tutorial Page 1 of 9

GroupWise Web Access 8.0

BankNet Instructions for Large File Transfer. May 20, 2013 Version 1.1

Edinburg CISD Technology Department Internet Part 3 Using Microsoft Exchange

Background Information

Secure Management Guide. June 2008

EJGH Encryption User Tip Sheet of 8

7. In the boxed unlabeled field, enter the last 4 digits of your Social Security number.

Help Desk User Manual (Version 1.0)

Outlook Web Access

Upon Installation, Soda

Using Internet or Windows Explorer to Upload Your Site

How to Use JCWHosting Reseller Cloud Storage Solution

Access your directories (home directory and shared directories) outside Tilburg University

Enter your User Id and Password and click the Log In button to launch the application.

EDGETECH FTP SITE CUSTOMER & VENDOR ACCESS

MOVEit Encrypted File Transfer

Getting Started Guide - Desktop

Websense Secure Messaging User Help

Microsoft OneDrive. How to login to OneDrive:

TEACHER MESSENGER. August 5, 2014 Student Information Systems

How to install and use the File Sharing Outlook Plugin

How To Use A Certifiedprofile.Com

Store, Edit and Share your files in OneDrive for Business on Web. A. Activate OneDrive for Business (Only for First-time Users)

Make Voice Calls and Share Documents using Skype*

Outlook Web Access (OWA) with Exchange Server 2007 (Windows version)

Outlook Web Access. PRECEDED by v\

FTP Over SSL (FTPS) Core FTP LE. Installing Core FTP LE"

SECURE User Guide

Secure Messaging Service

How to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide

EDE Electronic Data Exchange Instructions April 2007

Proofpoint provides the capability for external users to send secure/encrypted s to EBS-RMSCO employees.

Cloud Web Portal User Guide Version 2.0

Secure A Guide for Users

Encryption. How do I send my encryption key?

Mikogo Web Conferencing & Remote Support. User Guide (Windows Version)

Log-in to the patient booking website

Online Academic and Administrative Service System. (GRIPS Gateway) Operation Manual (Student)

D2L STUDENT MANUAL. Prepared by KAMEL SMIDA. Head of E-Learning Unit at the. Applied Medical Sciences College. Majmaah University 5/10/2014

MSGCU SECURE MESSAGE CENTER

CONNECT-TO-CHOP USER GUIDE

Provider Database Consultant Guide

SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems

Access and Login. Single Sign On Reference. Signoff

Secure User Guide Receiving Secure from Merchants Bank

NCH Secure Web Delivery Instructions

Office365 at Triton College

OneSourceFax Customer Guide

Novo Nordisk Secure File Transfer User Guide

QMU. QuickStartIT: QMU OWA (webmail) service

Install MSU Google Drive on your Computer

How to Create a New User Account for MyGovernmentOnline

Mariemont City Schools

SJRWMD Cloud-Based Quick-Start Guide

Instructions for Secure Cisco Registered Envelope Service (CRES)

Using the Help Desk. Logging into Help Desk. Creating a New Help Desk Ticket

Figure 1. Deskguide Tumbleweed External User Instructions Page 1 of 5

Transcription:

Business Procedures: Send Secure Emails Created: 02-25-2014 Updated: 04-15-2014 Page 1 of 10

Overview From time to time it is necessary to be able to share confidential information with school districts via email. When such situations occur, it is important to ensure that email communications are exchanged in the most secure manner possible. The Commonwealth provides a Send Secure feature to help ensure the security of confidential emails. Confidential information includes all correspondence, including attachments, which contains personal information for a member or members, or which contains any other information that may not be considered public knowledge. In order to utilize the Commonwealth s Send Secure feature, the email exchange must be initiated by a Commonwealth employee from a Commonwealth email address (psersrep@pa.gov). Recipients can reply from within the Send Secure system but cannot generate Send Secure emails without utilizing the respond feature unless they have another security process in place for use on their system. The following procedures will assist you in the process of receiving a Commonwealth Send Secure email and in responding to the Send Secure email. Page 2 of 10

Opening Secure Emails from a Non-Commonwealth Email Address Triggers Once email recipients using non-commonwealth email addresses have followed the instructions for registering to receive secure Commonwealth emails per the document Email Encryption Desk Reference for Non-Commonwealth Users, the following instructions may be used for opening the resulting secure emails and any applicable attachments. Steps 1) You will receive an email notification indicating that a secure email has been sent to you 2) Click on the securedoc icon in the lower left hand corner of the notification email

3) Type your Password in the designated space and click on Open 4) A view of the secure email will appear in a new window 5) If an attachment was included with the email, the attachment will be listed below the Subject line. If no attachments were included, you may process and close the email. If an attachment was included, double click on the attachment name to open the file and move to step 6. Page 4 of 10

6) If you opened an attachment, you will receive a pop-up window asking if you would like to Open or Save the file or cancel processing of the file. You may choose either of these options. Selecting Open or Save will give you access to the file, and you may then process the attachment just like any attachment from a normal email. 7) Be sure to close all folders and internet browser windows as soon as you have finished processing the confidential information so that unauthorized parties cannot gain access to confidential information. This can be accomplished by Clicking on the red Xs in the upper right hand corner of each applicable screen Page 5 of 10

Replying to Secure Emails from a Non-Commonwealth Email Address Triggers Once email recipients using non-commonwealth email addresses have followed the instructions for registering to receive secure Commonwealth emails per the document Email Encryption Desk Reference for Non-Commonwealth Users, the following instructions may be used for replying to secure emails. In order for the reply to be sent securely, these instructions must be followed. Failure to comply with these instructions will result in emails being sent devoid of added security features. Steps 1) Follow steps 1-4 In Appendix A: Opening Secure Emails from a Non-Commonwealth Email Address to log in to the Send Secure email that you originally received. 2) Select Reply in the Send Secure view of the email; you can click on either occurrence of Reply or Reply All that appears on your screen. Page 6 of 10

3) Type your message in the body of the email 4) If you do not need to attach a file to the Send Secure Email move to step 9; if you have a file to attach to the Send Secure reply, click on Attachments Page 7 of 10

5) Click on Add Files in the pop-up box 6) Highlight the file that you need to attach and click on Open Page 8 of 10

7) Highlight the file and click on Upload File 8) Click on Done Page 9 of 10

9) If you included an attachment, the Attachment will now appear under the subject line. Select Send; you can select either occurrence of Send that appears on your screen. 10) You will receive a message indicating that your email was sent successfully 11) Be sure to close all folders and internet browser windows as soon as you have finished processing the confidential information so that unauthorized parties cannot gain access to confidential information. This can be accomplished by Clicking on the Xs in the upper right hand corner of each applicable screen Page 10 of 10