Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011



Similar documents
Secure Mail Message Retrieval Instructions

Secure User Guide. Guidance for Recipients of Secure Messages from Lloyds Banking Group

E Mail Encryption End User Guide

Clearswift Information Governance

Secure Frequently Asked Questions

Secure User Guide

Secure FAQs 1

Setting up secure communication with Ericsson. Guideline for Ericsson partners

HMRC Secure Electronic Transfer (SET)

Receiving Secure Customer Support frequently asked questions

Receiving Secure from Citi For External Customers and Business Partners

Security-Product by IT SOLUTIONS. security at the highest level JULIA. Security. Cloud Security

SECURE USER GUIDE OUTLOOK 2000

Office Standardization. Encryption Gateway. A Brief Guide for External Communication Partners.

Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption!

Encryption of Traffic

Encryption Made Simple

Unifying Information Security. Implementing Encryption on the CLEARSWIFT SECURE Gateway

Yale Software Library. PGP 9.6 for Windows

Encryption Made Simple

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

bank zweiplus Gateway user manual

mkryptor allows you to easily send secure s. This document will give you a technical overview of how. mkryptor is a software product from

FDIC Secure Procedures for External Users April 23, 2010

Secure - Customer User Guide How to receive an encrypted

Spambrella SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

March PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools

How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)

Guide for Securing With WISeKey CertifyID Personal Digital Certificate (Personal eid)

PrivaSphere Gateway Certificate Authority (GW CA)

Secure Part II Due Date: Sept 27 Points: 25 Points

Encrypting/Password Protecting Documents to be Sent via

Using Entrust certificates with Microsoft Office and Windows

Encryption Admin & User Guide

Borough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments

Recipients Guide for Encryption Version 1.2

Product Guide Revision A. McAfee Secure Web Mail Client Software

How to Change Your Send Options

Transport Layer Security (TLS) About TLS

MedMail User Manual. Contents. 1.0 Introduction. 2.0 Installing the system. 3.0 Program operation

Texas Medicaid & Healthcare Partnership (TMHP)

Extracting an S/MIME certificate from a digital signature

Product Guide Revision A. McAfee Secure Web Mail Client Software

Chapter 9. IP Secure

Send and receive encrypted s

White paper. Why Encrypt? Securing without compromising communications

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide

Secur User Guide

User Guide May Using Certificates in Outlook Express

SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

Recalling A Sent Message in Outlook 2010

Balamaruthu Mani. Supervisor: Professor Barak A. Pearlmutter

End-to-End Encryption for Everybody?

Savitribai Phule Pune University

Secure User Guide

Version 4 Revised 5/2015

Spreed Keeps Online Meetings Secure. Online meeting controls and security mechanism.

Secure Client Guide

1. In the , open the attached file called SecureMessageAtt.html. Opening the file will launch a new browser window.

Secure Your with Encryption as a Service

How to Use Boston Private Bank s Secure Mail Service

PKI Contacts PKI for Fraunhofer Contacts

How To Send An Encrypted To The State From The Outside (Public)

GETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures

10/28/2013. Partners Zixmail Web Portal. Provider Training. Let s Get Started!

RPost Outlook Quick Start Guide

User Guide Using Certificate in Microsoft Outlook Express

Creating a Content Group and assigning the Encrypt action to the Group.

DATA PROTECTION. OneWorld Encrypted Messages USER GUIDE

Instructions for Secure Cisco Registered Envelope Service (CRES)

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

Spambrella SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

PrestoFax User Guide Version 3.0

Prerequisite. Getting Started. Signing and Encryption using Microsoft outlook 2007

If you are the recipient of an encrypted message, the following instructions will help you to decrypt your message. The California State University

DIGIPASS CertiID. Getting Started 3.1.0

Regions Secure Webmail. Instructions

Encryption Recipient Guidelines

Personal Secure Certificate

U.S. Bank Secure Mail

PGP Product Update Juha Ropponen

Encryption. How do I send my encryption key?

Prerequisite. Getting Started. Signing and Encryption using Microsoft outlook 2010

WatchDox for Windows. User Guide. Version 3.9.5

Cornerstones of Security

TCS-CA. Outlook Express Configuration [VERSION 1.0] U S E R G U I D E

HMRC Secure Electronic Transfer (SET)

Essex Contractor Services Agency. Ophthalmic Statement. Decryption Software

Registering at the Secur site

iq.suite Crypt - Server-based encryption - Efficient encryption for Lotus Domino

How to Send an Encrypted via KDADS' Outlook Client or Outlook Web Application

How To Encrypt With An Certificate On An From A Gmail Account On A Pc Or Mac Or Ipa (For A Pc) On A Microsoft Gmail (For An Ipa) Or Ipad (For Mac) On

There are several ways of creating a PDF file using PDFCreator.

Transcription:

Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011 1

Options for encrypted e-mail communication with AUDI AG Confidential information may only be transmitted in encrypted form over the Internet from and to AUDI AG. We offer our suppliers and partners the following options with regard to encrypted e-mail communication with AUDI AG: 1 Permanent transport encryption (TLS / Transport Layer Security) Useful if employees of a partner company exchange confidential e-mails on an occasional to frequent basis with employees of AUDI AG and/or with partner companies that already have PGP keys or S/MIME certificates. 2 PGP keys or S/MIME certificates Useful if numerous different employees of a partner company frequently exchange confidential e-mails with various employees of AUDI AG. 3 Encrypted PDF file Necessary if a partner company has thus far implemented neither option 1 nor option 2. With this method, confidential e-mails are transmitted from Audi to the partner company by means of an encrypted PDF file. 2

1. Permanent transport encryption (TLS / Transport Layer Security) Principle: Establishing a permanently active, secure e-mail connection between a partner company and AUDI AG. This is done with the aid of transport encryption between two e-mail gateways (MTA, Mail Transfer Agents). Application: If numerous employees within your company frequently exchange confidential e-mails with AUDI AG. The entire e-mail traffic from and to AUDI AG is automatically carried out with transport encryption, without requiring further input on the part of the user. Even if other security measures are used incorrectly (e.g. PGP encryption), e-mails are still transmitted securely. None Certificate costs for securing the e-mail communication Costs for adapting the e-mail gateway An application has to be made to AUDI AG for connection via permanent transport encryption (TLS / Transport Layer Security). Further information can be found in the document e-mail encryption with AUDI AG. 3

2. PGP keys or S/MIME certificates Principle: Encryption of individual e-mails on the basis of established cryptographic standards. To encrypt and decrypt e-mails, both the sender and recipient must have suitable key materials and/or a certificate, which they must have either published and/or exchanged. Application: If you have PGP keys or S/MIME certificates and/or you only exchange confidential e-mails occasionally with AUDI AG. Existing PGP keys or S/MIME certificates can be used. PGP keys or S/MIME certificates can also be used for communication with other companies. In most cases, requires additional input for the user when sending / receiving e-mails (key management) Certificate costs If applicable, licence costs Further information on encryption by means of PGP or S/MIME can be found in the document e-mail encryption with AUDI AG. If you do not already have PGP keys / S/MIME certificates, please contact your IT Support department. 4

3. Encrypted PDF file Principle: Encryption of individual e-mails by generating an encrypted PDF file. In order for partners to be able to decrypt e-mails from AUDI AG, they need to have suitable software for opening PDF files (e.g. Adobe Reader). Application: If you only receive confidential e-mails very occasionally from AUDI AG and there is no other secure transmission path, you will be sent an e-mail with an attached PDF file. Hardly any investment in IT infrastructure necessary. Transmission of confidential data in compliance with the rules is ensured. High level of input required for users when sending / receiving e-mails, since for each encrypted e-mail a new password has to be exchanged separately by phone / text message. High requirements in terms of password management, as old e-mails can only be read with the corresponding password. None In order to decrypt encrypted PDF files, you require suitable software (e.g. Adobe Reader). Please contact your IT Support department about this. If you are unable to see attachments sent by AUDI AG, click in Adobe Reader on: View Navigation Tabs Attachments 5