ACS Email Encryption Recipient Guide



Similar documents
Xerox Encryption Recipient Guide. Cisco Registered Envelope Service

Honeywell Secure External User Guide August 2013

Secure Management Guide. June 2008

EJGH Encryption User Tip Sheet of 8

Background Information

Can I manually trigger secure to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.

CISCO SECURE MAIL. External User Guide. 1/15/15 Samson V.

Outlook Web Access (OWA) with Exchange Server 2007 (Windows version)

Secure - Customer User Guide How to receive an encrypted

SECURE COMMUNICATIONS PLAN Updated August 25, 2011

U.S. Bank Secure Mail

Vanguard Secure Service (VSES) User Guide

P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems

Using Voltage Secur

TriCore Secure Web Gateway User Guide 1

Page 1 Rev Date: February User Manual for Encrypted Services

Stewart Secure User Guide. March 13, 2015

Jumble for Microsoft Outlook

Using etoken for Securing s Using Outlook and Outlook Express

4. Click Next and then fill in your Name and address. Click Next again.

Receiving Secure from Citi For External Customers and Business Partners

Welcome to HomeTown Bank s Secure ! User Guide

Instructions For Opening UHA Encrypted

Division of School Facilities OUTLOOK WEB ACCESS

SECURE User Guide

Encryption Procedures

Children s Service. Secure Guide for external users

SECURE USER GUIDE OUTLOOK 2000

How To Send An Encrypted To The State From The Outside (Public)

Encryption. How do I send my encryption key?

Secure FAQs 1

Directory and Messaging Services Enterprise Secure Mail Services

smarshencrypt User s Guide

Using Entrust certificates with Microsoft Office and Windows

Encryption Recipient Guidelines

Receiving Secure s

1. How to Register Forgot Password Login to MailTrack Webmail Accessing MailTrack message Centre... 6

INET1005 May 2009 Getting Started with MyUH

E Mail Encryption End User Guide

BlackBerry Internet Service. Version: User Guide

How To Set Up Your

Secure Client Guide

Secure User Guide

Initial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion

Introduction to Webmail for staff

Secure User Guide. Guidance for Recipients of Secure Messages from Lloyds Banking Group

Orbital ATK Secure Receiving Encrypted Messages. Why Orbital ATK Secure ? Initial Orbital ATK Secure Notification

How to access your via Outlook Web Access

How To Use Webmail. Guiding you through the Universities online

How to Send an Encrypted via KDADS' Outlook Client or Outlook Web Application

Word Secure Messaging User Guide. Version 3.0

Using your Encrypted BlackBerry

How to setup Outlook and Outlook Web Access (OWA) to give a send receipt and a read receipt (Options)

Archive Add-in User Guide

Recalling A Sent Message in Outlook 2010

Secure A Guide for Users

Initial Setup of Microsoft Outlook with Google Apps Sync for Windows 7. Initial Setup of Microsoft Outlook with Google Apps Sync for Windows 7

Secure User Guide. PGP (Pretty Good Privacy)

Department of Alcohol & Drug Programs. Information Management Services Division (IMSD) ENCRYPTION INSTRUCTIONS

Secure Mail Registration and Viewing Procedures

Secure Actions for Recipients

Using the PeaceHealth Secure System

Wakefield Council Secure and file transfer User guide for customers, partners and agencies

FDIC Secure Procedures for External Users April 23, 2010

Using the Web service

This document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee.

File Share Service User guide

MSGCU SECURE MESSAGE CENTER

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8

ADP Secure Client User Guide

I. Configuring Digital signature certificate in Microsoft Outlook 2003:

Class Outline. Part 1 - Introduction Explaining Parts of an address Types of services Acquiring an account

Nationstar Mortgage Secure Client User Guide

USER GUIDE. This user guide covers the following topics: Getting to know the interface. Attaching a document to an

Baylor Secure Messaging. For Non-Baylor Users

Registering at the Secur site

10/28/2013. Partners Zixmail Web Portal. Provider Training. Let s Get Started!

Reading mail via the Web on Mail.uh.edu

Division of Public and Behavioral Health (DPBH) INTRODUCTION TO SECURE . Updated October 2015

S-Doc User Guide. Instructions on using the Secure Document Online Courier with the CAAT Pension Plan. September 2012

PREMIUM MAIL ADMINISTRATOR GUIDE

USC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9

Mimecast Services for Outlook (MSO4)

USING YOUR LOGIX HOSTED

PREMIUM MAIL USER GUIDE

Secur User Guide

Webmail Access. Contents

Cryptshare for Outlook User Guide

SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

Quick Start : i-fax User Guide

Secure Client User Guide Receiving Secure from Mercantile Bank

Recipients Guide for Encryption Version 1.2

Initial Setup of Mozilla Thunderbird with IMAP for Windows 7

DATA PROTECTION. OneWorld Encrypted Messages USER GUIDE

Borough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments

1. Navigate to Control Panel and click on User Accounts and Family Safety. 2. Click on User Accounts

Secure Recipient Guide

Secure User Guide

Online Banking Quick Reference Guide

Transcription:

ACS Email Encryption Recipient Guide

ACS ENCRYPTION SERVICES / TRAINING AND AWARENESS ACS Email Encryption Recipient Guide Email Encryption Recipient Guide ACS A Xerox Company 2828 North Haskell Dallas, TX 75204 For Support Call 1-866-356-4890 Email Encryption Recipient Guide v2.1 1 ACS, A Xerox Company

Table of Contents INTRODUCTION... 3 OPENING AND READING AN ENCRYPTED EMAIL... 4 SENDING AN ENCRYPTED EMAIL TO ACS... 9 MANAGING ENCRYPTED MESSAGES... 10 Email Encryption Recipient Guide v2.1 2 ACS, A Xerox Company

Introduction Establishing secure lines of communication is a top priority at ACS. Every day we handle a multitude of sensitive and confidential information on behalf of our clients and employees. It is vital that we properly secure information that travels through our e-mail servers. The protection of Personal Information is critical to maintain our reputation and achieve our goals at ACS. Protecting information that has been entrusted to us is crucial to ACS business because data management is the core of so many of the services we offer. In addition to legal requirements, our customer contracts require that we use, handle, and store Personal Information in accordance with specific standards, which can differ widely from customer to customer with monetary, legal, and other penalties for failure to do so. As part of our work to continually provide world-class service and to assure our clients and employees that their Personal Information is safe, ACS Information Systems Security Services and ACS Messaging have worked together to provide e-mail encryption services to our clients and employees. Information that Requires Encryption ACS manages highly sensitive information for our employees, clients, and our clients customers and constituents. This information is known as Personal Information. [PI] Personal Information defined, is information in any form (written, oral or electronic) that could be used alone or in combination with other information to identify an individual. Some information, such as a Social Security Number, can be used alone to identify an individual, and is therefore considered Personal Information. Other types of information, such as a zip code, must be combined with other data to identify an individual in order to be considered Personal Information. There are a variety of types of data that, alone or in combination with other information, can be used to create Personal Information. These include, but are not limited to: An individual s name, address, zip code, email address, telephone and fax numbers All dates related to an individual (e.g., birth date, admission date) Health-related information of any kind, including providers, treatment, insurance coverage, and payment information Account or card numbers identifying a specific individual's account, including medical, health care, and financial accounts Tax ID and Social Security Number, driver s license and license plate numbers, photograph, or biometric identifier User IDs, passwords, and logins Employment and education records Compensation and benefits information Financial Information for both ACS and our clients: this includes internal accounting and financial reporting data, credit card numbers, bank account information, mortgage information, client finance and accounting information, etc. Email Encryption Recipient Guide v2.1 3 ACS, A Xerox Company

Opening and Reading an Encrypted Email 1. Open your email message entitled ACS Secured Message. 2. Click on the link provided to read the message. ACS Secured Message From: acs.employee@acs-inc.com) Add contact Sent: Fri 2/01/08 1:26 PM To: Jane.safe@anywhere.com You have received an ACS Secured Message from: Employee, ACS <acs.emplyee@acs-inc.com> To read this message securely, please click this link: https://acspgp01.acsinc.com/b/b.e?r=jane.safe28%40hotmail.com&n=mzqkc3%2b7zgm79cfkvcni9w%3d%3d CONFIDENTIALITY NOTICE: This e-mail message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. 3. If you are a first time user, you will be prompted to create a passphrase. This allows access to a secure Inbox where you can read the decrypted emails. Click on Continue to proceed. Email Encryption Recipient Guide v2.1 4 ACS, A Xerox Company

Opening and Reading an Encrypted Email (continued) On the Message Delivery Options page, you will be prompted to select the way you want to receive future e-mails from ACS. At the present time the PGP Web Messenger is the only option and is already selected for you. (This is for screen is for first time users only.) 4. Click the Choose Option button. NOTE: It is recommended that you check the box labeled: Save a copy of all outgoing messages in my Sent Mail folder. Email Encryption Recipient Guide v2.1 5 ACS, A Xerox Company

Opening and Reading an Encrypted Email (continued) Please Note the Following with Regards to Login: If you have already set up your account you will only be asked to enter your passphrase. If you have previously logged in and forgot you passphrase you will receive the following screen; or if you log into Web Messenger directly (log out and log back in) you will also receive the following screen. If you receive this screen Type your E-mail Address and Passphrase on the PGP Web Messenger login page. 5. Click the Login button. Email Encryption Recipient Guide v2.1 6 ACS, A Xerox Company

Opening and Reading an Encrypted Email (continued) You are directed to your personalized Secure Inbox as shown below. If there are multiple messages, the PGP Universal server displays all messages. 6. Click on the desired message from the list. Once a message is open, you can use the tool bar to Reply, Reply to All, and Download Attachments or Delete. Note: Recipients can reply back to a secured e-mail as long as: 1. The reply is sent to those listed as recipients on the e-mail. 2. The reply is sent to an email address that is part of a managed domain (currently the managed domain consists of email addresses containing asc-inc.com, acs-hro.com and buckconsultants.com) Email Encryption Recipient Guide v2.1 7 ACS, A Xerox Company

Opening and Reading an Encrypted Email (continued) 7. Click the Logout button, once you have completed your tasks. If the recipient attempts to send an email to someone who is not already carbon-copied on the email or is not part of the managed domain, the following error message will appear: Note: Please be aware that attachments do not appear with the paperclip icon as they do in Outlook. Recipients of encrypted email must scroll down to the end of the message to confirm that an attachment has been included with the email. Email Encryption Recipient Guide v2.1 8 ACS, A Xerox Company

Sending an Encrypted Email to ACS You can send a secure e-mail to ACS using Web Messenger. With this procedure, emails originating from the Client or Vendor site may only be sent to persons with managed ACS domains listed on the PGP server. This typically includes emails sent to recipients with the following domain addresses as well as some others: acs-inc.com acs-hro.com buckconsultants.com To compose an encrypted message: 1. Click the Compose button from the Inbox screen. Complete the fields as normal. 2. Click the Send button. Note: DO NOT SEND emails to a distribution list. The PGP server is not designed to send encrypted messages to distribution lists. The name(s) of each recipient must be entered individually. Note: Your session will time-out after 15 minutes of inactivity. You will have to log in again and compose your entire email. Email Encryption Recipient Guide v2.1 9 ACS, A Xerox Company

Managing Encrypted Messages Users of email encryption who have their email system set up to automatically save outgoing messages in the Sent folder can review and manage these messages by selecting the Sent button from any screen. When this is done, the following screen will appear: By selecting the desired sent message, you can display it for review and/or deletion. Remember the amount of memory allocated for messages is not very large, so please keep the number of messages saved in the Inbox and Sent box to a minimum. Email Encryption Recipient Guide v2.1 10 ACS, A Xerox Company