Secure Email Actions for Email Recipients



Similar documents
FDIC Secure Procedures for External Users April 23, 2010

Figure 1. Deskguide Tumbleweed External User Instructions Page 1 of 5

Secure . Instructions for Use

Secure A Guide for Users

Welcome to HomeTown Bank s Secure ! User Guide

MSGCU SECURE MESSAGE CENTER

U.S. Bank Secure Mail

EASTPOINTE SECURE E MAIL SYSTEM SETUP INSTRUCTIONS

January 31, 2006 v2.0 Page 1 of 15

10/28/2013. Partners Zixmail Web Portal. Provider Training. Let s Get Started!

Stewart Secure User Guide. March 13, 2015

TriCore Secure Web Gateway User Guide 1

How to Use Boston Private Bank s Secure Mail Service

Page 1 Rev Date: February User Manual for Encrypted Services

Overview of Registered Envelopes. Registered Envelope Notification Message

UC Irvine Health Secure Mail Message Center

User Guide. Delta Controls Single Sign On

E Mail Encryption End User Guide

SEC External Guide for Using the Encryption Solution

Secure - Customer User Guide How to receive an encrypted

Secur User Guide

MUTUAL OF OMAHA SECURE SYSTEM CLIENT/PARTNER USER GUIDE

Secure File Transfer Guest User Guide Updated: 5/8/14

Children s Service. Secure Guide for external users

GRS Advantage Website User Reference Guide

Encrypted Users Guide. Revised 6/8/2015

Honeywell Secure External User Guide August 2013

CISCO SECURE MAIL. External User Guide. 1/15/15 Samson V.

Provider Express Obtaining Login Access. Information for Network Providers

Nationstar Mortgage Secure Client User Guide

Monash Health Self Service

Receiving Secure Customer Support frequently asked questions

Directory and Messaging Services Enterprise Secure Mail Services

Xerox Encryption Recipient Guide. Cisco Registered Envelope Service

EduAccess User Guide For Observation Data Capture Tool Users

Version 4 Revised 5/2015

Secure Messaging Service

Encryption. Cisco Ironport. using. Click here to begin

Websense Secure Messaging User Help

Registering at the Secur site

Self-Service Password Manager

Secure Message Center User Guide

How To Encrypt An From A Cell Phone To A Pc Or Ipad (For A Partner) With A Cisco Encryption Solution (For Partners)

NCH Secure Web Delivery Instructions

Orbital ATK Secure Receiving Encrypted Messages. Why Orbital ATK Secure ? Initial Orbital ATK Secure Notification

Encryption Recipient Guidelines

How To Open An Encrypted

Global UGRAD Program

How To Access A Secure From The State Of Iceland

This guide will provide assistance and take you through the steps for using the service. The guide will cover:

Secure Share (Novell Filr) Remote Teacher Video Sharing Process School Year

Table of Contents. Lesson 5: Assign Delegate...30 Objectives Assign A Delegate Edit Delegate Permissions... 33

Using the PeaceHealth Secure System

Nessus Cloud User Registration

Department of Alcohol & Drug Programs. Information Management Services Division (IMSD) ENCRYPTION INSTRUCTIONS

Help Administration (top right) > User Management > Add User Delete

P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems

How to Send an Encrypted via KDADS' Outlook Client or Outlook Web Application

Secure Mail Registration and Viewing Procedures

Guide to setting up and using secure

Online Class Registration Quick Guide for Students

This document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee.

Quick Start Guide to Logging in to Online Banking

Secure Client User Guide Receiving Secure from Mercantile Bank

Job Aid: Accessing the VA Talent Management System (TMS)

Instructions For Opening UHA Encrypted

PaymentNet Federal Card Solutions Cardholder FAQs

SECURE User Guide

SQFAD Company Re-Registration Guide Re-registration for Existing Suppliers

The Cancer Institute NSW Grants Management System User Guide

Central Commissioning Facility Research Management Systems (RMS): User Guidance

Secure Messaging Quick Reference Guide

Encryption Procedures

ADP Secure Client User Guide

Bahamas Tax Information Exchange Portal Documentation

Reset Virtual Gateway Password Job Aid

Secure Share (Novell Filr) Remote Teacher Video Sharing Process School Year

Proofpoint provides the capability for external users to send secure/encrypted s to EBS-RMSCO employees.

Secure with ZixCorp. Iowa Division of Banking

Secure transmission of Protected Health Information (PHI)

External End User Training Guide: Secure Extract

MSI Secure Mail Tutorial. Table of Contents

Salesforce Training Logging into Salesforce SALESFORCE LOGIN

Secure and File Transfer Service User Guide Version 3.0

SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

Livingston County. Encryption. Revised Date: 10/06/2015 Revision: 1.0 File Name: Mimecast Encryption

Spambrella SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

DATA PROTECTION. OneWorld Encrypted Messages USER GUIDE

Spambrella SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

CSA Helpdesk User Guide

Secure User Guide Receiving Secure from Merchants Bank

Secure FAQs for External Stakeholders

COST MANAGER A GUIDE TO PAPERLESS BILLING

Encryption User Guide

Steps to Opening Your First Password-Protected Envelope

Graham Group Helpdesk User Guide: FAQ and Tricks

How To Send An Encrypted To The State From The Outside (Public)

Receiving Secure from Citi For External Customers and Business Partners

Bank of Hawaii Protecting Confidential

Transcription:

Secure Email Actions for Email Recipients Actions for Email Recipients The recipient cannot forward encrypted email outside the secure system. Each email will only be available to the recipient for 30 days. The first time a recipient receives secure email, the recipient must register and create a password by following the steps in the Register the First Time section of this document. After registering, the recipient can log in and access secure email at the following location: Access Secure Email https://securemail.jnl.com/websafe/ifc Register the First Time The first time a recipient receives secure email, the registration process allows the recipient to create a user account and password. This should only have to be done once. 1. Open the email with the subject Websafe Registration Notification. Revised 19 MAY 2011 Page 3

Secure Email Actions for Email Recipients 2. Click the Click here to register link to open the New User Registration screen. 3. Complete the name fields. 4. Complete the password fields using the criteria outlined in the Password Requirements section of this document. 5. In the Personal Security Phrase field, type a phrase that will appear on future secure emails to confirm that they are from a legitimate source. 6. Clear the checkbox to Remember You on This Computer, for security purposes. 7. Click the Register button. A confirmation screen opens. 8. Close the browser window or tab containing the confirmation screen. The original email will now be sent by the secure system. 9. Open the new email with the subject WebSafe Notification Email. Revised 19 MAY 2011 Page 4

10. Click the Click here to log in link to open the Account Login screen. Secure Email Actions for Email Recipients 11. Type the email address and password, and click the Login button to open the secure Inbox. 12. Click the subject of the email to open it. 13. Click the Reply link to respond to the message. NOTE: Secure email cannot be forwarded outside the secure network. Revised 19 MAY 2011 Page 5

Secure Email Actions for Email Recipients Open a Secure Email Message Before opening a secure email, the registered recipient must log in to the encryption system. 1. Open an email with the subject Websafe Registration Notification. 2. Click the Click here to log in link. 3. Type the email address and password, and click the Login button to open the secure Inbox. Revised 19 MAY 2011 Page 6

4. On the Inbox screen, click the subject of the email to open it. Secure Email Actions for Email Recipients 5. In the email, click the Reply link to respond to the message. Secure email cannot be forwarded outside the secure network. Recover a Lost or Forgotten Password A recipient can request a temporary password. The temporary password expires in three hours. If the process is not completed in time, begin these steps again. 1. On the Account Login screen, click the Forgot password? link. The Forgot Password screen opens. 2. Type the email address and click the Continue button. A temporary password will be emailed to that email address. Revised 19 MAY 2011 Page 7

3. Open the new email with the subject Your New Password. Secure Email Actions for Email Recipients 4. Use the mouse to copy the password (without the quotes) in the sentence beginning, Your temporary password is. 5. Click the link ending with the word Password. The Account Login screen opens. Revised 19 MAY 2011 Page 8

Secure Email Actions for Email Recipients 6. Type the email address. In the Password field, paste the temporary password that was emailed and click the Login button. The Change Password screen opens. 7. In the Current Password field, again paste the temporary password that was emailed. 8. In the New Password and Confirm New Password fields, type a new password that meets the criteria outlined in the Password Requirements section of this document. 9. Click the Change button. The Change Password confirmation screen opens. 10. Click the Click here to log in link. On the Account Login screen, log in and view the Inbox. Revised 19 MAY 2011 Page 9

Reset a Password A recipient can reset a password at any time. Secure Email Actions for Email Recipients 1. From the Inbox screen, click the Edit Profile link to open the Edit Profile screen. 2. In the New Password and Confirm Password fields, type a new password that meets the criteria outlined in the Password Requirements section of this document. 3. In the Password field, type the current password that will be replaced by the new password. 4. Click the Save Profile button. The Edit Profile screen is refreshed, indicating the new password was accepted. Continue with the Open a Secure Message section of this document. Additional Support For additional assistance, refer to the support information on the cover of this document. Revised 19 MAY 2011 Page 10