idgard User Manual Section II, Version 1 idgard User Manual

Size: px
Start display at page:

Download "idgard User Manual Section II, Version 1 idgard User Manual"

Transcription

1 idgard User Manual Section I: idgard at a Glance, Application Fields, Positioning, idgard vs. Others, Security Basics Section II: Service Features Application via Browser Secton III: Administrator Manual Setting up Single Sign-onion III: Administrator Manual Setting up Single Sing-on Section IV: Application of Windows Productivity Tool Application of Office Add-In (Outlook, Word, etc.) Section V: Application via ios App Application via Blackberry / Android App Application via WebDAV Section VI: Further Tips & Tricks for Data Rooms Section VII: API Definition 1

2 Table of Contents: Section II Table of Contents: Section II Service Features Description User Types Privacy Boxes: Team Workspace Creating Folders Uploading, Moving, Renaming or Deleting Files Easy Versioning Viewing Files, Images and Videos without Download Downloading Multiple Files & Directories Deleting Files (Deletion Guarantee) Granting Access to & Sharing Privacy Boxeses Creating & Using Box Links Removing Box Links & Sealing Privacy Boxes Adding Users per Click Inviting Users as Guests Writing, Reading, and Answering Messages Chatting New Files & Messages / Timeline Marking Read Files as Unread Locking Files (Check-in & Check-out) Grouping Privacy Boxes & Tags Key Words for Directories Secure Login via 2-Factor Authentication SMS Passcode idgard Login Card Vodafone Secure Login Secure idgard Logout Access & Rights Management Access for Limited Periods of Time Temporary Privacy Boxes (Automatic Deletion) Auditable Data Rooms Data Backup (with Sealed Backup) Settings Modifying Passwords Creating a New PUK Session Time-out Help Licenses, Roles and Rights Overview (Charts) idgard Account Licenses & Rights Administration Rights idgard Privacy Box Roles & Rights Application via Browser idgard Login idgard Classic Login Browser Composition Simultaneous Work with Multiple Privacy Boxes Work per Timeline Languages & Other Settings Definitions / Glossary

3 1 Service Features Description 1.1 User Types When you wish to communicate safely business internally and externally online, you can t necessarily expect your dialogue partner to use the same web privacy service as you. For this reason, idgard not only offers Full Licenses (licenses for staff in your own organization) but also one-time access (for non-recurring) and Guest Licenses (for external parties granted reading and writing rights). With the aforementioned access tyoes, you can invite external users to download files or, as a guest, to upload own files. If your Administrator has already registered your organization at idgard, then you will either receive a Full License from him/her per via access link, or your business has already prepared idgard access per Single Sign-on. In the latter case, simply click the idgard button in your browser or Intranet. If you receive a link, then it is either for one-time access or an invitation to become a regular user. In the former case, you simply have to respond to the security inquiry (captcha) and enter your name. In the latter event, you enter a user name and password of your choice, which grant you access to idgard. 1.2 Privacy Boxes: Team Workspace idgard service is founded on so-called Privacy Boxes. Each Privacy Box has storage space, in which files can be arranged in directories. These very boxes are also used to exchange messages, schedule appointments, and much more. Each Privacy Box grants a circle of authorized parties access. The parties include the creator of the box, i.e. Owner, and its further member(s). Said members can be granted or denied specific rights. A member may, for example, be granted Privacy Box management rights. 3

4 A user may also create Privacy Boxes for himself/herself only, without sharing it with others. However, the scope of members can also comprise all parties of a specific department or project. Finally, a Privacy Box may also be used for communication between merely two parties. 1.3 Creating Folders Any user granted writing rights may create folders or directories within a Privacy Box. The user that created the folder, the Owner and the Box Manager can each move or delete the folder. Every folder can include a description and key words, in addition to its actual name. 1.4 Uploading, Moving, Renaming or Deleting Files As long as the Owner or Privacy Box Manager have granted you the right, you may upload files either individually or collectively into each of the box's respective directories. These files and all other files can then be moved from one folder to another within that box, without having to be uploaded a second time, provided you have been granted the right. Lastly, you may delete the files that you uploaded yourself and, if granted the right, all other files in that box. 1.5 Easy Versioning When you upload a file with a name that already exists in a particular directory, a version number automatically appears in parentheses next to the file name. An exception is made if you have previously locked the file. In this case, the file is overwritten with the same name. However, to lock a file, you need deletion rights, which the Owner or Box Manager can grant you. 1.6 Viewing Files, Images and Videos without Download A variety of formats, i.e. PDF files, images, and videos, can be accessed with a simple click. These may be viewed (streamed) instantly, without having to define where they should be saved. Videos can be accessed, before they are completely downloaded. If you nevertheless wish to download a file and save it locally, you can select this option upfront. This option is also available per click in the file preview, in which you can already see its content. 4

5 1.7 Downloading Multiple Files & Directories If you wish to download more than one file or directory at the same time, simply mark them and click "download". This will automatically create a Zip file, in which the selected files and directories are wrapped together as one file. 1.8 Deleting Files (Deletion Guarantee) Clicking the wastebasket deletes files and messages. In conventional systems, deleted files often simply aren't visible anymore but not actually completely deleted. With idgard, confirming deletion leads to irreversible "nonrestorability" of files (as per Level 3 pursuant to German DIN standard). An exception is made if Sealed Backup was activated for a particular Privacy Box prior to deletion (see 1.23). 1.9 Granting Access to & Sharing Privacy Boxes es If you have created a Privacy Box or were granted management rights through the Owner, you may share the box with third parties and grant them access rights to the Box, as well. To do so, simply click the "share" icon Creating & Using Box Links One way to grant third parties access rights to a Privacy Box, is to create and use a Box Link. Such a link (capability URL) allows you to a) grant a non-idgard user one-time access (read-only rights) to a respective Privacy Box or to b) grant an idgard user (possibly from an altogether independent business) lasting access to a particular Privacy Box. In either case, each call to a Box Link reduces the total amounts of access attempts by one digit. Said access limit is pre-set to "150". Both the Owner and Privacy Box Managers can arbitrarily set the access volume to their liking anywhere between "1" and "10,000". 5

6 Security Note: Both a) and b) scenarios can be secured with an additional 2nd factor, i.e. a further password of your choice. Alternatively, you may also opt to select a password from the code suggestions feature. By clicking the "disconnect" button, all existing sessions mentioned in a) are interrupted Removing Box Links & Sealing Privacy Boxes If the Owner or a party granted management rights to a Privacy Box (Box Manager) sets the access limit to "0" (or simply selects "seal"), or if the previously defined lifespan of a Box Link expires, the link becomes invalid, i.e. null and void and can no longer be used. The Privacy Box is then considered "sealed". Security Note: Box Links contain a key that the idgard infrastructure uses to grant a user access rights. Upon sealing, a new key is created in the background with an internal key infrastructure (PKI) and deposited in the authorized parties' profiles, without ever leaving the idgard infrastructure. This enhances overall security Adding Users per Click Another way to add further users to a Privacy Box, is by simply add-clicking the names of your organization's list of idgard users and guests Inviting Users as Guests If you can't find an external party's name in said list, you can invite him/her as a guest. This third method of adding further users to a Privacy Box postulates that you enter the guest's name, and, if applicable, mobile number and then send that external party an invitation link. When your external dialogue partner accesses this link, a form is opened with which he/she can enter an own discretionary user name and password. When logging on to idgard with the aforementioned data, he/she automatically becomes a member of the Privacy Box from which you sent the invitation. Security Note: Entering a mobile number is recommended when an SMS Passcode is to be used for added security. Alternatively, one can also use an idgard Login Card or 6

7 Vodafone Secure Login to this end. It's up to the addressor to decide whether this added security should apply to mere registration or to every login thereafter in the form of 2- factor login. (See 2-Factor Authentication 1.17) Writing, Reading, and Answering Messages You may create and save messages in any directory. These messages are displayed next to the respective files of the same directory, so they are automatically viewed in the correct context. Hence, a reader appropriately associates message content directly with respective file content. This spares elaborate explanations and saves time. Users may read and answer messages any time and establish threads (a series of messages in succession) akin to . These messages can be downloaded with files for the purpose of filing Chatting If parties granted access to a given Privacy Box wish to communicate briefly and informally yet confidentially with each other, they can use the Chat feature. The history of all chat messages can be downloaded or deleted by the Owner and parties granted management rights to a Privacy Box New Files & Messages / Timeline When idgard users create new files or write chat messages or memos, they are marked as unread. By clicking the marked Privacy Box or folder, the user intuitively accesses the unread files or messages. A separate view, the Timeline, lists notifications that can be sorted to one s liking according to time, Privacy Box, user, or file type. Users intuitively accesses unread files per click. This feature provides a quick overview of all changes regarding a specific group of users Marking Read Files as Unread As soon as you open a file or message, it is marked as a read notification. However, if you realize you don't have the time to devote yourself to that file just then, you can mark it as unread again. That way, you can easily find the file or message at a later point in time, when you have more time. 7

8 1.14 Locking Files (Check-in & Check-out) When working in teams, one often wonders who is currently working on a file, how to prevent various parties from modifying the file at the same time, and how to later conveniently consolidate the various results. The "Lock file" feature allows you to easily signalize to other members of a Privacy Box that you are currently working on a file until it is again unlocked. As long as the file is locked, the other members of that respective Privacy Box see who locked it. During this period, the other members can download the file but not upload it under the same name. Only a user that has locked a file can save it under the same name. Note: For smooth use of this feature, the users with check-out rights should be granted deletion rights, as well, so that substituting a file under a new name doesn't pose a conflict. This can be arranged by both Owners and Managers of a Privacy Box Grouping Privacy Boxes & Tags When a user works intensely with multiple groups or teams via idgard, his/her general overview shows a large number of Privacy Boxes. To facilitate filing and allow each user to create an own, individual structure, each Privacy Box can be tagged. These tags are not visible to other users. In your tag overview, you may filter your Privacy Boxes according to tags, in order to quickly isolate various box groups (e.g. private, business, internal, external). You may also create interfaces Key Words for Directories If you wish to make large file volumes available to other user or are granted access to Privacy Boxes with many directories yourself, then you can facilitate navigation using key words or catch phrases. One may create new key words per modification mode for a specific folder or simply choose from that section's list of given key words. Key words are visible to all parties within a Privacy Box. 8

9 1.17 Secure Login via 2-Factor Authentication Due to the increased risk of ID theft when working online, i.e. that the user name or password are stolen or guessed via cyber-crime, we strongly recommend enforcing 2-factor authentication when using idgard: SMS Passcode In this case, with each login, once you have entered your user name and password, the idgard infrastructure automatically sends a six-digit code via SMS to your mobile phone. The SMS Passcode on the display of your mobile phone is then entered in the respective login field of your terminal. You are not granted access to idgard prior to this. Your Administrator(s) and/or the person who invited you to access id- GARD can arrange this setting for you. Should you not receive the SMS, due to poor mobile reception, you can also request it through an alternative path, using the link that is available next to the SMS Passcode entry field idgard Login Card If you have an idgard Loging Card, you will be asked to create a six-digit code using your Login Card every time you login (i.e. once you have entered your user name and password), which is then entered into the displayed field. Your Administrator(s) and/or the person who invited you to access idgard can arrange this setting for you. idgard Login Cards are available at Uniscon Vodafone Secure Login If you have booked Vodafone's feature "Secure Login" and your Administrator or the person who invited you to access idgard have adjusted this setting for you, each login via user name and password will route you to Vodafone, asking you to enter a PIN into your mobile device. 9

10 1.18 Secure idgard Logout When logging off from idgard, you can choose between: a) ending the current session only, b) ending all sessions except the current one, or c) ending all sessions, including the current one. Option b) is particularly convenient if you logged on to idgard with a foreign or thirdparty device and have forgotten to log-off. This instantly ensures that no unauthorized third party abuses this session. Irrespective of this feature, idgard automatically ends sessions once every 24 hours. This is only one of many further security features Access & Rights Management Each Privacy Box has a "members" area, in which its Owner and Box Managers can grant its users specific rights. These rights consist of: reading rights writing rights deletion rights the right to view members within a Privacy Box the right to chat The "Modify" area allows the settings of new Privacy Box members to be adjusted upfront. For a detailed breakdown on all licenses, roles and rights, see the chart in Chapter Access for Limited Periods of Time Depending on when a Privacy Box's content applies, it is sometimes advisable to only grant members access rights for limited periods of time (e.g., if a communication shouldn't be announced too early but requires much preparation, or if an invitation to tender should only be downloadable commencing a specific date. The beginning and end of said access period's date and time may be specified when accessing the menu "Modify box properties" and "Box properties". 10

11 1.21 Temporary Privacy Boxes (Automatic Deletion) In order to avoid data overkill and ensure that data is not stored longer than necessary, one can create a "Temporary Privacy Box". You Administrator can adjust the respective settings and rights to be granted. This easily prevents data overkill. As soon as the defined deletion date is reached, the Privacy Box is automatically deleted with its entire content. Notification of the user prior to expiration of the term is currently in development but not yet implementable. The Administrator can thus limit the lifespan of a Temporary Privacy Box Auditable Data Rooms As long as an Administrator books Data Room licenses and grants the Owner or Privacy Box Managers the right to create a Data Room, then they can upgrade a regular Privacy Box to a Data Room. In other words, PDF files can be assigned anti-forwarding security, if necessary. This is done either a) via dynamic watermark or b) via view-only feature. With a), every PDF file is marked with the name of the party who downloaded it and the time it was downloaded. With b), user are granted view-only rights and cannot download the files, that are also dynamically watermarked. One can also set an alarm that is triggered if a specific amount of files is accessed or downloaded by members of a Data Room within a defined period of time. The alarm alerts the Owner and Data Room Manager. A further feature of the Data Room is that all activity, i.e. file uploads, downloads, deletion, etc., is stored in an auditable journal. Said journal can be accessed and downloaded in its entirety or in filtered form. Finally, own usage terms can be defined for each Data Room, which are presented to each Data Room member prior to first usage (per click-through agreement, i.e. CTA). A user can then only access a Data Room once he/she has given his/her consent to the CTA. If usage terms are modified, each user is again asked to confirm his/her consent to the new terms. 11

12 1.23 Data Backup (with Sealed Backup) Your Administrator may also book Sealed Backup. This protects your data in the data center in the event of loss, accidental deletion, or disaster. Side Note: What is Sealed Backup? Conventional data security and backup systems, as opposed to idgard, have the drawback that they allow the service provider to access data, to restore it. This postulates that the service provider has an access key. Sealed Backup was invented exactly for this reason. In contrast to customary systems, with Sealed Backup, encrypted data is not restored back to its original system but rather, if necessary, to a separate system, where it can be downloaded per user name and password known only to you. In order to nonetheless be able to delete data as guaranteed in 1.8 if desired, Sealed Backup can be activated or deactivated individually per Privacy Box Settings The Administrator or your organization can define various settings that apply to you, although not visible to you as a user. Thus, idgard fulfills a broad range of requirements and special demands. At the same time, the settings of other features may be defined by the individual user, according to his/her liking. To name only a few: preferred Privacy Box overview (tags, tiles, list, or compact view) preferred folder overview within a Privacy Box (keywords, tiles, list view) preferred language (Deutsch, English, Italiano, Francaise, Espanol) 1.25 Modifying Passwords Should you have reason to believe that your password was misappropriated or stolen, or should your business decree password changes on a regular basis, you can do this via "Settings" and "Change password". 12

13 1.26 Creating a New PUK Right after registration, when you select a user name and password, you are assigned a Password Unblocking Key (PUK). With this key, you can create a new password even without an existing idgard session. If you lose this PUK, you need a new one, which can be created and printed under this heading Session Time-out Time-out, in which an idgard session ends automatically upon inactivity, can be defined arbitrarily anywhere between 10 minutes and 8 hours by the user, provided this right was granted by the Administrator. The extent of recommended time-out depends on the trustworthiness of the environment, in which idgard is used. Short-interval time-outs are recommended in cases, in which unauthorized parties can easily access your computer, tablet, or mobile device. If you are certain that no unauthorized parties can access your session, you can also set long-term intervals, for added convenience Help ln the Help menu, you find the phone number to our idgard Support hotline, various contacts, fax numbers, links to manuals and the Terms & Conditions, and a model Commissioned Data Processing Agreement regarding the commissioned collection, processing or use of personal data, which we recommend you conclude. 13

14 2 Licenses, Roles and Rights Overview (Charts) 2.1 idgard Account Licenses & Rights Licenses: Full Licenses Guest Licenses may be granted all rights granted limited rights and can not see internal directory Rights to respective action: 1 means is granted the right 0 means is not granted the right A means Administrator can define whether or not rights are granted Full License Guest License Action 1 1 Login with user name and password 1 1 Add login security via 2-factor authentication 1 0 Automatic login per Single Sign-on (SSO), LDAP/AD 1 0 Can see the names of those granted a Full License within an account A 0 Can invite guests 1 0 Can see the names of guests created by oneself A 0 Can see the names of those granted a Guest License within an account A 0 Can create/modify Privacy Boxes A 0 Can create/modify Temporary Privacy Boxes A 0 Can create/modify Data Rooms 1 0 May be granted administration rights 1 0 May be granted Registration Administrator rights The user that performs the initial registration is assigned a Full License and, owing to registration, the Registration Administrator role automatically. The user name and password, as well as the PUK of the Registration Administrator, are to be stored in a very safe place, since this data can not be restored by Uniscon (the service provider of idgard) for security purposes. For further details, please see the next subchapter and the Administrator Manual in Section III. 14

15 2.2 Administration Rights Administrators: Registration Administrator The user that performs an account's initial registration. All other users are "invited users". Administrator A Full License user granted administration rights by an Administrator Regular User A user with a Full License, who has the right to invite guests Registration Admini- Regular Action Administrator strator User Can book licenses online and: switch package deals add further Full Licenses add further Guest Licenses order Data Rooms order Sealed Backup order SMS transfer of Passcode Can create and distribute Full Licenses Can create and distribute Guest Licenses Can bar/delete guests invited by oneself Can bar/delete all invited users Can see, for all Full Licenses: how many Data Rooms were created how many guests were invited which guests were invited Can see, for all licenses of an account: creation & registration date and time date & time of first & last login Can adjust the settings of Full License rights to: invite guests create Privacy Boxes 15

16 Registration Admini- Regular Action Administrator strator User grant / revoke administration rights create Data Rooms view all guests Can adjust settings for all users: notification/reminder on/off Can create Enterprise Secret for SSO Can apply for / access Sealed Backup snapshot 2.3 idgard Privacy Box Roles & Rights Roles: Owner Box Manager Full member Guest One-time access Creator of the Privacy Box - only possible with Full Licenses and right to create Boxes - internal staff member from own account or - external party from external account Is granted the right to manage a Privacy Box - only possible with Full License - internal staff member from own account or - external party from external account Regular member with Full License - internal staff member from own account or - external party from external account Regular member with Guest License - external party from own account or - external party from external account Access via link, without idgard license - no license or rights necessary - if Box Code is activated, it must be available Rights to respective action: 1 means is granted the right 0 means is not granted the right E means Owner or Privacy Box Manager can define whether or not rights are granted 16

17 A means Administrator can define whether or not rights are granted The (internal and external) representatives of the various roles can either be granted their rights from one's own account or from an (external) third-party account. Management rights may also be granted to parties coming from organizations other than one's own. This freedom enables very efficient project management beyond company borders. Owner Box Manager Full Member Guest One-time Access Action 1 1 E E 0 Can see other Privacy Box members 1 1 E E E Reading rights (folders, files, messages) 1 1 E E 0 Writing rights (folders, files, messages) Can lock all files Can unlock files locked by oneself Can unlock all locked files Can delete own files, messages, etc. 1 1 E E 0 Can delete unlocked files, etc. of third parties 1 1 E E 0 Can chat (read & write messages) Can download or delete chat messages 1 1 E E E Can participate in polls 1 1 E 0 0 Can initiate polls Can add private tag to Privacy Boxes Can share Privacy Boxes (link, click, guest) Can modify Box properties Including: modify Box name create/modify Box description create Box Link, modify access limit create/modify Box Code add to / remove from Sealed Backup A A Can convert Box into a Temporary Privacy Box & define auto-deletion date & time of Box 17

18 Owner Box Manager Full Member Guest One-time Access Action A A Can upgrade Privacy Box to Data Room Can adjust journal visibility setting 1 1 E 0 0 Can view and download journal Can set Click-Through Agreement usage term Can set anti-screen-scraping alarm parameter Can set Data Room back to Privacy Box Can eliminate members Can be removed from Privacy Box Can remove oneself from Privacy Box Can grant full members management rights Can be granted new management rights to Box Can be rejected Box management rights Can delete Privacy Box and its entire content 18

19 3 Application via Browser Users can access idgard with any common browser: Firefox, Chrome, Opera, Safari, Internet Explorer as of Version 11, etc. With idgard Classic, users even have limited access as of Internet Explorer 8 and unlimited access as of Internet Explorer idgard Login For registered users, idgard access begins via login at my.idgard.de. If your account is connected to a Login Card, or the SMS Passcode feature has been activated, you must generate a one-time password with your Login Card or deduct the SMS Passcode from your mobile phone. 3.2 idgard Classic Login For registered users, idgard access begins via From here (or using the login button at you are automatically forwarded to where you can access idgard entering your user name and password. 19

20 3.3 Browser Composition Logging on to idgard with your browser opens the following view: 1.) idgard Task Bar The task bar on the top of your screen shows the idgard logo, that your organization's Administrator can replace with your own business logo. On the right-hand side of this bar, you find data regarding your current session. This is the time you accessed the last session, your name, the license type you are using, and your license's expiration date, if it no longer needs to be used. On the left-hand side of the task bar, you find the Site Navigator icon. It allows rapid access to your Privacy Boxes, as well as access to settings, help, and the button with which to close your session. 2.) Privacy Box Overview When you begin a session, you instantly access a Privacy Box overview, which summarizes all the latest information in idgard. A green navigation bar at the top of your Privacy Box Overview can be used to search terms, select the preferred view, create new Privacy Boxes, or close your idgard session. 3.) The main part of this page shows you an overview of your Privacy Boxes, either as tiles (which are convenient if you have only a few Boxes and are using a touch-screen) or as a list. Data Rooms are emphasized explicitly. 4.) When a particular Privacy Box is accessed, a blue menu bar is added to the green one. This task menu provides the appropriate tools, depending on the current view form (files, chat, poll feature, etc.). 20

21 5.) Just below the latter task menu, you find so-called breadcrumbs, i.e. paths showing the folders and subfolders you are currently in within a Privacy Box. Each tile (or each list, if you have chosen that view) shows further features, the instant your finger or mouse touches them. In the above illustrated example, the right-hand tile is marked with the mouse cursor, which reveals buttons to further features within that Box. 3.4 Simultaneous Work with Multiple Privacy Boxes If you open multiple Privacy Boxes, irrespective of whether per Privacy Box Overview or Site Navigator, they appear next to each other in the navigation bar, where you can go back and forth between the work areas. When you go back to a Privacy Box, you can continue where you left, without again having to use the Navigator. 3.5 Work per Timeline The more you use idgard as a communication tool, and the more data is exchanged for teamwork and common projects, the more you will appreciate the Timeline feature. Across the top of all Privacy Boxes and, consequently, across all dialogue groups, you will see all unread files, messages, chats, etc. This allows you to jump to the respective Privacy Box quickly, access the file and/or message, and react accordingly. Once you have completed a task, you can jump to the Timeline via Site Navigator and dedicate yourself to the next unread file and/or message. 21

22 If you are sure that you wish to mark certain objects as read, without accessing them, then you can do so either individually or an entire Privacy Box at once, in the column on the far right. 3.6 Languages & Other Settings idgard automatically applies the language settings of your browser. If your browser was set to German, idgard automatically appears in German. If you wish to switch to another language, simply go to the Site Navigator and select the language of your choice under the menu item "Settings". 22

23 Definitions / Glossary Access limit Account Administrator Anti-forwarding App Capability URL Captcha Chat Data Room Full License Guest License The number indicating how often a Box Link may be used. The sum of all licenses and access your business is granted, including those of your guests. An idgard account manager is called Administrator or, more simply, Admin. Protects PDF files in Data Rooms from being forwarded by its users. This is ensured, on the one hand, with a watermark that appears across the entire PDF file. On the other hand, files appear in view-only mode, so they can not be downloaded. Abbreviation for application. Stands for software applied on small, portable devices. An Internet link that implies certain rights and options. Said options can be limited, also in their period of validity. A Capabilty URL can often only be used once. A security inquiry or puzzle on your screen, that can conventionally only be solved by humans. This excludes access through digital robots. Brief text message, often used for informal communication. Short for Virtual Data Room. Represents an actual room, in which dossiers, records, and documents are filed securely, that should only be accessible to authorized parties. The files and documents in the Data Room are for reading only, and who has accessed which data is recorded per protocol. This virtual room also involves a journal and watermarks files, to hinder copying of files. Data Rooms can require prior consent to special usages terms. License for a staff member, whose organization has booked id- GARD. When communicating beyond company borders, one can not always expect external dialogue partners to use the same privacy service as oneself. Therefore, idgard als offers, besides Full Licenses (for staff members of the same business), Guest Licenses, with which external users are granted access to download files or can upload own ones. 23

24 idgard LDAP integration Passcode Privacy Box Read-only access Sealing A service based on Sealed Cloud technology, with which to exchange files and work in teams (a coinage of "ID" and "guard"). idgard ensures that the number of parties able to access a file is equal to the amount of people for which it is intended. Sealed Cloud technology excludes all undesired access of unauthorized parties. Lightweight Directory Access Protocol (LDAP) ensures directory access protocols, such as Microsoft Active Directory, which organizations use to regulate data access. Linkage of idgard to these digital business directories allow idgard access without having to enter a user name and password. If a user has logged on to a business network, he/she can access idgard with only one click. To prevent unauthorized parties from accessing data when a user logs on to idgard using his/her user name and password or an access link or Box Link, the user may be forced to use a further code, that is sent to him/her by separate means, i.e. a Passcode. idgard storage space and workspace are called Privacy Boxes. The members list of a Privacy Box defines who is granted access. Its members are the only ones who can write, i.e. upload, or download files in the respective area. Each Privacy Box constitutes a private circle of dialogue partners. idgard can create as many Privacy Boxes as groups that communicate. Users that don't dispose of idgard may be granted access nonetheless. A Box Link is created, with which the user can access a Privacy Box (via capability link technology). The user simply clicks the link and then accesses the Box and its respective content (per read-only mode). In information technology, security is often confused with mere encryption. However, the reliability of encryption technology often depends on who has access to the access keys. What's more, systems whose data is processed in unencrypted form are often protected against external attacks yet not internally (e.g. against parties in charge of the operating system). In contrast, sealing implies a hermetic technology, which, as opposed to mere organizational measures, technically excludes even service provider staff from accessing any data. In other words, mere organizational measures, in which access is limited to a strict number of authorized parties, are insufficient and can not be deemed secure. Seal- 24

25 ing, on the other hand, relies on purely technical measures, which completely eliminate any unauthorized access to data at all times. (See "Sealed Cloud" below). Sealed Cloud Synchronization URL WebDAV A technology that secures cloud infrastructures against business internal and external attacks. In conventional cloud infrastructures, provider staff and administrators can access all data that is processed on an OS level, a hardware level, or a software level. With its key distribution and data clean-up system, Sealed Cloud technically excludes that both external parties AND internal data center or service provider staff can access any data. Since areas with poor reception, that prevent you from being able to access idgard, are sometimes inevitable, but you nevertheless might need to access your data, the system offers automatic synchronization. This ensures that data stored elsewhere per id- GARD is automatically filed on your device, as well. For this feature, simply install the idgard Productivity Tool. Universal Resource Location, a web link to a particular internet server and directory. Web Distributed Authoring and Versioning (WebDAV), a standard that allows idgard data structures (e.g. file overviews) to be viewed as a directory. 25

SERVICE DESCRIPTION & ADDITIONAL TERMS AND CONDITIONS VERSIEGELTE CLOUD. Service description & additional terms and conditions VERSIEGELTE CLOUD

SERVICE DESCRIPTION & ADDITIONAL TERMS AND CONDITIONS VERSIEGELTE CLOUD. Service description & additional terms and conditions VERSIEGELTE CLOUD Service description & additional terms and conditions VERSIEGELTE CLOUD Last revised: March 19, 2018 Page 1 of 10 PUBLICATION DETAILS Published by Telekom Deutschland GmbH Landgrabenweg 151 53227 Bonn

More information

idgard User Manual Section I, Version 1 idgard UserManual idgard at a Glance, Application Fields, Positioning, idgard vs. Others, Security Basics

idgard User Manual Section I, Version 1 idgard UserManual idgard at a Glance, Application Fields, Positioning, idgard vs. Others, Security Basics idgard UserManual Section I idgard at a Glance, Application Fields, Positioning, idgard vs. Others, Security Basics Section II: Section III: Section IV: Section V: Section VI: Service Features Application

More information

User Help

User Help ginlo @work User Help 19 June 2018 Contents Get started... 5 System requirements for the ginlo @work app... 5 Recommended browsers for ginlo websites... 6 Supported languages... 6 Navigation in ginlo @work...

More information

Introduction Secure Message Center (Webmail, Mobile & Visually Impaired) Webmail... 2 Mobile & Tablet... 4 Visually Impaired...

Introduction Secure Message Center (Webmail, Mobile & Visually Impaired) Webmail... 2 Mobile & Tablet... 4 Visually Impaired... WEB MESSAGE CENTER END USER GUIDE The Secure Web Message Center allows users to access and send and receive secure messages via any browser on a computer, tablet or other mobile devices. Introduction...

More information

SIMSme Management Cockpit Documentation

SIMSme Management Cockpit Documentation Introduction SIMSme Management Cockpit Documentation Version 2.1 February 2018 Table of Contents 1 INTRODUCTION... 2 2 USERS... 3 3 LICENSES... 5 4 GROUPS... 7 5 CHANNELS... 8 6 DASHBOARD...10 7 APP SETTINGS...12

More information

GRS Enterprise Synchronization Tool

GRS Enterprise Synchronization Tool GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table

More information

Sync User Guide. Powered by Axient Anchor

Sync User Guide. Powered by Axient Anchor Sync Powered by Axient Anchor TABLE OF CONTENTS End... Error! Bookmark not defined. Last Revised: Wednesday, October 10, 2018... Error! Bookmark not defined. Table of Contents... 2 Getting Started... 7

More information

Anchor User Guide. Presented by: Last Revised: August 07, 2017

Anchor User Guide. Presented by: Last Revised: August 07, 2017 Anchor User Guide Presented by: Last Revised: August 07, 2017 TABLE OF CONTENTS GETTING STARTED... 1 How to Log In to the Web Portal... 1 How to Manage Account Settings... 2 How to Configure Two-Step Authentication...

More information

Storebox User Guide. Swisscom (Switzerland) Ltd.

Storebox User Guide. Swisscom (Switzerland) Ltd. Storebox User Guide Swisscom (Switzerland) Ltd. Contents (/). Basics/Settings 4. What is Storebox? 5. File Structure 6.3 System Prerequisites 7.4 Logging in to the team portal 8.5 Logging out of the team

More information

Android User Guide. for version 5.3

Android User Guide. for version 5.3 Android User Guide for version 5.3 Contents 1. Installation... 3 1.1. How to install Babelnet... 3 1.2. Enter Babelnet in the search field.... 3 1.3. Safety precautions when using Babelnet on your Android...

More information

TeamViewer 12 Manual Management Console. Rev

TeamViewer 12 Manual Management Console. Rev TeamViewer 12 Manual Management Console Rev 12.1-201704 TeamViewer GmbH Jahnstraße 30 D-73037 Göppingen www.teamviewer.com Table of content 1 About the TeamViewer Management Console 4 1.1 About the Management

More information

WorksPad. User Guide

WorksPad. User Guide Version 3.0.6 January 2017 MobilityLab, LLC. 2011-2017 MobilityLab, LLC. All rights reserved. MobilityLab,, the logo are trademarks or registered trademarks of MobilityLab, LLC. in the U.S., Russia and

More information

Salesforce Classic Guide for iphone

Salesforce Classic Guide for iphone Salesforce Classic Guide for iphone Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

Using the Self-Service Portal

Using the Self-Service Portal UBC Workspace 2.0 Using the Self-Service Portal Using the Self-Service Portal to access and manage your content July 2017 Table of Contents Introduction... 3 Overview... 3 User Types... 4 Compliance and

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

GoToMyPC Corporate Administrator Guide

GoToMyPC Corporate Administrator Guide GoToMyPC Corporate Administrator Guide Contents Getting Started... 6 Administration Center Overview... 6 Log in to the Administration Center... 6 Notes on Installation and Feature Access... 8 Mac Features...

More information

AT&T Business Messaging Account Management

AT&T Business Messaging Account Management Account Management Administrator User Guide July 2016 1 Copyright 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T

More information

Salesforce Classic Mobile Guide for iphone

Salesforce Classic Mobile Guide for iphone Salesforce Classic Mobile Guide for iphone Version 41.0, Winter 18 @salesforcedocs Last updated: November 30, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered

More information

User Guide. BlackBerry Workspaces for Windows. Version 5.5

User Guide. BlackBerry Workspaces for Windows. Version 5.5 User Guide BlackBerry Workspaces for Windows Version 5.5 Published: 2017-03-30 SWD-20170330110027321 Contents Introducing BlackBerry Workspaces for Windows... 6 Getting Started... 7 Setting up and installing

More information

FilesAnywhere Features List

FilesAnywhere Features List FilesAnywhere Feature List FilesAnywhere Page 1 of 9 Contents Basic Features... 3 Advanced Features... 7 Enterprise Features... 9 FilesAnywhere Page 2 of 9 Basic Features No File Size Limit: There is no

More information

COMMUNITIES USER MANUAL. Satori Team

COMMUNITIES USER MANUAL. Satori Team COMMUNITIES USER MANUAL Satori Team Table of Contents Communities... 2 1. Introduction... 4 2. Roles and privileges.... 5 3. Process flow.... 6 4. Description... 8 a) Community page.... 9 b) Creating community

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

System Administrator s Guide Login. Updated: May 2018 Version: 2.4

System Administrator s Guide Login. Updated: May 2018 Version: 2.4 System Administrator s Guide Login Updated: May 2018 Version: 2.4 Contents CONTENTS... 2 WHAT S NEW IN THIS VERSION 2018R1 RELEASE... 4 Password Retrieval via Email (GDPR Alignment)... 4 Self-Registration

More information

PARTICIPANT (STUDENT) DOCUMENTATION Introduction. Getting Started. Requesting an Account

PARTICIPANT (STUDENT) DOCUMENTATION Introduction. Getting Started. Requesting an Account PARTICIPANT (STUDENT) DOCUMENTATION Introduction The Experiment Management System provides an easy method for you to sign up for studies, and track your progress throughout the term. Everything is done

More information

DreamFactory Security Guide

DreamFactory Security Guide DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit

More information

End User Manual. December 2014 V1.0

End User Manual. December 2014 V1.0 End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How

More information

User Help. Fabasoft Cloud

User Help. Fabasoft Cloud User Help Fabasoft Cloud Copyright Fabasoft R&D GmbH, Linz, Austria, 2019. All rights reserved. All hardware and software names used are registered trade names and/or registered trademarks of the respective

More information

Seite 1 von 20

Seite 1 von 20 This English translation is provided for your convenience only. In the event of discrepancies the German original text shall prevail over the English translation. Version of October 2016 Version of July

More information

Product Brief. Circles of Trust.

Product Brief. Circles of Trust. Product Brief Circles of Trust www.cryptomill.com product overview Circles of Trust is an enterprise security software system that eliminates the risks associated with data breaches from a hacker attack

More information

Cisco Collaborative Knowledge

Cisco Collaborative Knowledge Cisco Collaborative Knowledge Product Overview. Your workforce needs knowledge, speed and flexibility to solve real-world business challenges in today s fast moving digital economy. Cisco Collaborative

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Biz Storage File Share User s Manual

Biz Storage File Share User s Manual Biz Storage File Share User s Manual ~ For General Users ~ Note: If you have any questions, please ask your site administrator of Biz Storage File Share. ShareStage ASP Service changed its named to Biz

More information

VDA 6.3-Analysis Tool User manual

VDA 6.3-Analysis Tool User manual VDA 6.3-Analysis Tool User manual Contents 1 Foreword... 3 1.1 Licence... 3 2 Description and installation of the tool... 3 2.1 Reports/ action plans / files... 4 2.2 JSON file format... 4 2.3 Checking

More information

Breeze at Penn State. About meeting roles and permissions

Breeze at Penn State. About meeting roles and permissions Breeze at Penn State About meeting roles and permissions There are three roles for meeting room attendees: the Host role, the Presenter role, and the Participant role. Each role has different rights in

More information

1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari) and go to

1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari) and go to VMWare AirWatch User Guide for Web Browser You can access your AirWatch Files from a web browser. How to login AirWatch Cloud Storage? 1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari)

More information

Bring Your Own Device

Bring Your Own Device Bring Your Own Device Individual Liable User Contents Introduction 3 Policy Document Objectives & Legal Disclaimer 3 Eligibility Considerations 4 Reimbursement Considerations 4 Security Considerations

More information

ACT Test Accessibility and Accommodations System (TAA) User Guide

ACT Test Accessibility and Accommodations System (TAA) User Guide ACT Test Accessibility and Accommodations System (TAA) User Guide www.act.org ACT Test Accessibility and Accommodations System (TAA) User Guide Table of Contents Overview... 2 Introduction to the Test

More information

EMPLOYEE DIRECTORY (SHAREPOINT ADD-IN)

EMPLOYEE DIRECTORY (SHAREPOINT ADD-IN) EMPLOYEE DIRECTORY (SHAREPOINT ADD-IN) Global, Global Plus version Updated: March 2018 Version 1.0.0.7 Copyright Beyond Intranet 2017. All Rights Reserved i Notice. This is a controlled document. Unauthorized

More information

Sona Systems, Ltd. Experiment Management System Master Documentation Set 20 April 2015

Sona Systems, Ltd. Experiment Management System Master Documentation Set 20 April 2015 Sona Systems, Ltd. Experiment Management System Master Documentation Set 20 April 2015 Copyright 2015 Sona Systems, Ltd., All Rights Reserved PARTICIPANT (STUDENT) DOCUMENTATION... 2 Introduction... 2

More information

Netwrix Auditor for SQL Server

Netwrix Auditor for SQL Server Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

Cisco Meeting App. User Guide. Version December Cisco Systems, Inc.

Cisco Meeting App. User Guide. Version December Cisco Systems, Inc. Cisco Meeting App User Guide Version 2.5.0 December 2018 Cisco Systems, Inc. www.cisco.com 1 Contents 1 Contents 1 Contents ii 1 Version history iv 1 Welcome to Cisco Meeting App 5 1.1 Cisco Meeting App

More information

Android Rep Console

Android Rep Console Android Rep Console 2.2.10 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property of their respective owners.

More information

Admin Table is oftr Caoto ntr e s U ntsser Guide Table of Contents Introduction Accessing the Portal

Admin Table is oftr Caoto ntr e s U ntsser Guide Table of Contents Introduction Accessing the Portal Administrator s Table of Contents User Guide Table of Contents Introduction 3 Accessing the Portal 3 Create User Accounts 4 Enable / Disable User Accounts 5 Manage Users from an LDAP Server 5 User Roles

More information

Welcome to ncrypted Cloud!... 4 Getting Started Register for ncrypted Cloud Getting Started Download ncrypted Cloud...

Welcome to ncrypted Cloud!... 4 Getting Started Register for ncrypted Cloud Getting Started Download ncrypted Cloud... Windows User Manual Welcome to ncrypted Cloud!... 4 Getting Started 1.1... 5 Register for ncrypted Cloud... 5 Getting Started 1.2... 7 Download ncrypted Cloud... 7 Getting Started 1.3... 9 Access ncrypted

More information

McAfee Security Management Center

McAfee Security Management Center Data Sheet McAfee Security Management Center Unified management for next-generation devices Key advantages: Single pane of glass across the management lifecycle for McAfee next generation devices. Scalability

More information

User Guide. SaleSphere App and backend

User Guide. SaleSphere App and backend User Guide SaleSphere App and backend Version 2.0.1 20.07.2018 Content 1. Welcome to the world of SaleSphere... 1 System requirements... 1 Initial installation... 2 2. First Login... 3 3. Here we go: The

More information

for Credit is between September 5 and October 3 at midnight.

for Credit is between September 5 and October 3 at midnight. Fall 2017 Human Subjects Sona opens September 5, 2017 Last day to do studies is December 12 at midnight Last day to make changes/corrections is December 17 at midnight Longer BRIEF SUMMARY Prescreen INSTRUCTIONS.

More information

Administrator s Guide

Administrator s Guide Administrator s Guide (January 2017) Welcome! You have been invited to manage the subscriber community who will be using this videoconferencing service within your organization. This guide will provide

More information

ishipdocs User Guide

ishipdocs User Guide ishipdocs User Guide 11/8/2016 Disclaimer This guide has been validated and reviewed for accuracy. The instructions and descriptions it contains are accurate for ishipdocs. However, succeeding versions

More information

BlackBerry Workspaces Server Administration Guide

BlackBerry Workspaces Server Administration Guide BlackBerry Workspaces Server Administration Guide 6.0 2018-10-06Z 2 Contents Introducing BlackBerry Workspaces administration console... 7 Configuring and managing BlackBerry Workspaces... 7 BlackBerry

More information

Getting Started with Soonr

Getting Started with Soonr WWW.SOONR.COM Getting Started with Soonr A Quick Start Guide for New Users Soonr Inc. 12/19/2012 Revision 1.1 Copyright 2012, Soonr Inc., all rights reserved. Table of Contents 1 How Soonr Workplace Works...

More information

owncloud Android App Manual

owncloud Android App Manual owncloud Android App Manual Release 2.0.0 The owncloud developers December 14, 2017 CONTENTS 1 Using the owncloud Android App 1 1.1 Getting the owncloud Android App...................................

More information

Let s work together. Instructions pcvisit ProfiSupport version from

Let s work together. Instructions pcvisit ProfiSupport version from Instructions pcvisit ProfiSupport version from 24.07.2009 pcvisit ProfiSupport is a streamlined solution specifically suited to the task of facilitating IT support. The software allows support worldwide,

More information

BC6.3 User Guide (Part 1)

BC6.3 User Guide (Part 1) BC6.3 User Guide (Part 1) Document Management and Searching C Sellar 27 May 2015 Version 1 BC-27769333 BC6.3 User Guide (Part 1) Document Management and Searching Executive Summary This is the BC User

More information

ClientNet Admin Guide. Boundary Defense for

ClientNet Admin Guide. Boundary Defense for ClientNet Admin Guide Boundary Defense for Email DOCUMENT REVISION DATE: Feb 2012 ClientNet Admin Guide / Table of Contents Page 2 of 36 Table of Contents OVERVIEW... 3 1 INTRODUCTION... 3 1.1. AUDIENCE

More information

Amazon WorkDocs. User Guide

Amazon WorkDocs. User Guide Amazon WorkDocs User Guide Amazon WorkDocs: User Guide Copyright 2017 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection

More information

Codebook. Codebook for OS X Introduction and Usage

Codebook. Codebook for OS X Introduction and Usage Codebook Codebook for OS X Introduction and Usage What is Codebook Encrypted Data Vault Guards passwords and private data Keeps sensitive information organized Enables quick recall of secrets Syncs data

More information

samwin 5.1 R3 User Manual

samwin 5.1 R3 User Manual samwin 5.1 R3 User Manual Version 1.0 Last Modified September 17, 2012 Contents 1 Introduction... 3 2 Using the samwin contact center suite Operator Console... 4 2.1 Basic Information about Control...

More information

Storage Made Easy. Providing an Enterprise File Fabric for INVESTOR NEWSLETTER ISSUE N 3

Storage Made Easy. Providing an Enterprise File Fabric for INVESTOR NEWSLETTER ISSUE N 3 INVESTOR NEWSLETTER ISSUE N 3 Storage Made Easy Providing an Enterprise File Fabric for STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR OPENIO Storage Made Easy (SME) File Fabric is a comprehensive Enterprise

More information

Getting Started. Opening TM Control Panel. TM Control Panel User Guide Getting Started 1

Getting Started. Opening TM Control Panel. TM Control Panel User Guide Getting Started 1 TM Control Panel User Guide Getting Started 1 Getting Started Opening TM Control Panel To open TM Control Panel (CP), perform the following steps: 1 In the browser address field, type https://cp.netmyne.net.

More information

Sony Xperia Configurator Cloud User Instructions

Sony Xperia Configurator Cloud User Instructions Sony Xperia Configurator Cloud User Instructions This document is published by: Sony Mobile Communications Inc., 1-8-15 Konan, Minato-ku, Tokyo 108-0075, Japan www.sonymobile.com Sony Mobile Communications

More information

CANVAS OBSERVER GUIDE

CANVAS OBSERVER GUIDE CANVAS OBSERVER GUIDE This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike License Table of Contents Introduction...3 What is the Observer role?...4 How can I use Canvas

More information

Cisco WebEx Best Practices for Secure Meetings for Site Administrators and Hosts

Cisco WebEx Best Practices for Secure Meetings for Site Administrators and Hosts Cisco WebEx Best Practices for Secure Meetings for Site Administrators and Hosts First Published: 2016-04-04 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA

More information

Reseller Portal Administrator Guide. CTERA Portal. November 2015 Version 5.0

Reseller Portal Administrator Guide. CTERA Portal. November 2015 Version 5.0 Reseller Portal Administrator Guide CTERA Portal November 2015 Version 5.0 Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any

More information

Administration Guide. BlackBerry Workspaces. Version 5.6

Administration Guide. BlackBerry Workspaces. Version 5.6 Administration Guide BlackBerry Workspaces Version 5.6 Published: 2017-06-21 SWD-20170621110833084 Contents Introducing the BlackBerry Workspaces administration console... 8 Configuring and managing BlackBerry

More information

Service Manager. Ops Console On-Premise User Guide

Service Manager. Ops Console On-Premise User Guide Service Manager powered by HEAT Ops Console On-Premise User Guide 2017.2.1 Copyright Notice This document contains the confidential information and/or proprietary property of Ivanti, Inc. and its affiliates

More information

Sophos Mobile. startup guide. Product Version: 8.1

Sophos Mobile. startup guide. Product Version: 8.1 Sophos Mobile startup guide Product Version: 8.1 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are

More information

for Credit is from January 22 through February 20 at midnight.

for Credit is from January 22 through February 20 at midnight. Spring 2018 Human Subjects SONA opens January 22, 2018 Last day to do studies is May 1, 2018 at midnight Last day to make changes/corrections is May 6, 2018 at midnight Longer BRIEF SUMMARY Prescreen INSTRUCTIONS.

More information

START GUIDE CDMNext V.3.0

START GUIDE CDMNext V.3.0 1 START GUIDE CDMNext V.3.0 2018 CEIC Data. All rights reserved. 2 TABLE OF CONTENTS 1. PRODUCT OVERVIEW... 3 2. Starting CDMNEXT... 3 2.1 Login... 3 2.2 Prerequisites... 4 2.3 Landing Page... 4 3. creating

More information

PARTICIPANT (STUDENT) DOCUMENTATION

PARTICIPANT (STUDENT) DOCUMENTATION PARTICIPANT (STUDENT) DOCUMENTATION Introduction The Sona System provides an easy method for you to sign up for studies, and track your progress throughout the term. Everything is done through the software

More information

Knowledge Hub Walkthrough

Knowledge Hub Walkthrough Knowledge Hub Walkthrough Welcome page Sign in Use your Knowledge Hub account to sign in. Register Are you new to the Knowledge Hub, then please register a new account Forgotten Password? You will be asked

More information

WINDOWS HOST GUIDE. Remote Support & Management PC Mac Tablet Smartphone Embedded device. WiseMo Host module on your PC or Server

WINDOWS HOST GUIDE. Remote Support & Management PC Mac Tablet Smartphone Embedded device. WiseMo Host module on your PC or Server WINDOWS HOST GUIDE Remote Support & Management PC Mac Tablet Smartphone Embedded device WiseMo Guest module for example on your Windows PC WiseMo Host module on your PC or Server WiseMo develops software

More information

Long Beach Unified School District. Portal User s Guide. August 2014

Long Beach Unified School District. Portal User s Guide. August 2014 Long Beach Unified School District Portal User s Guide August 2014 INTRODUCTION The Long Beach Unified School District s PORTAL (mylbusd) provides users with access to District applications, services,

More information

Notification Template Limitations. Bridge Limitations

Notification Template Limitations. Bridge Limitations Oracle Cloud Known Issues for Oracle Identity Cloud Service Release 18.1.2 E55915-17 February 2018 Notification Template Limitations Note the following limitations with Oracle Identity Cloud Service notification

More information

bla bla Groupware User Guide

bla bla Groupware User Guide bla bla Groupware User Guide Groupware Groupware: User Guide Publication date Tuesday, 25. July 2017 Version 7.8.3 Copyright 2016-2017 OX Software GmbH, This document is the intellectual property of OX

More information

Consumer Banking User Guide. Getting Started

Consumer Banking User Guide. Getting Started Consumer Banking User Guide Getting Started Contents About the platform... 3 Installing the mobile banking app... 4 Opening mobile banking... 4 Accessing the online banking site... 4 Browser requirements...

More information

BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS

BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS WHITE PAPER BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS INTRODUCTION As more companies embrace the broad usage of individual liable mobile devices or BYOD for access to corporate applications and data,

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of June 2017. Vodafone Ready Business Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

NotifySync 4.7. Notify Technology Corporation

NotifySync 4.7. Notify Technology Corporation 1 NotifySync 4.7 Notify Technology Corporation Device Requirements 2 BlackBerry OS 4.1 4.7 (5.0 coming soon) 4.5.0 and later Attachments can be downloaded and saved to the file system or SD Card. Any attachment

More information

Oracle isupplier. Supplier User Guide

Oracle isupplier. Supplier User Guide Supplier User Guide Table of Contents isupplier Application, Help and Support... 3 Registration... 3 For Help... 3 Overview... 4 User Registration... 5 Login to isupplier... 7 isupplier and Sourcing Responsibility

More information

DOCUMENTUM D2. User Guide

DOCUMENTUM D2. User Guide DOCUMENTUM D2 User Guide Contents 1. Groups... 6 2. Introduction to D2... 7 Access D2... 7 Recommended browsers... 7 Login... 7 First-time login... 7 Installing the Content Transfer Extension... 8 Logout...

More information

Professional Editions Setup Guide

Professional Editions Setup Guide Professional Editions Setup Guide FOR TAX YEAR 2017 V 1 1 Table of Contents Click on any title to navigate directly to that section. Download and Install Download Installation File from Practice Manager

More information

SONA SYSTEMS. Manual for PARTICIPANTS (STUDENTS)

SONA SYSTEMS. Manual for PARTICIPANTS (STUDENTS) SONA SYSTEMS Manual for PARTICIPANTS (STUDENTS) Introduction The Experiment Management System provides an easy method for you to sign up for studies, and track your progress throughout the term. Everything

More information

Product Documentation. ER/Studio Portal. User Guide. Version Published February 21, 2012

Product Documentation. ER/Studio Portal. User Guide. Version Published February 21, 2012 Product Documentation ER/Studio Portal User Guide Version 1.6.3 Published February 21, 2012 2012 Embarcadero Technologies, Inc. Embarcadero, the Embarcadero Technologies logos, and all other Embarcadero

More information

Salesforce1 Mobile Security White Paper. Revised: April 2014

Salesforce1 Mobile Security White Paper. Revised: April 2014 Salesforce1 Mobile Security White Paper Revised: April 2014 Table of Contents Introduction Salesforce1 Architecture Overview Authorization and Permissions Communication Security Authentication OAuth Pairing

More information

22 August 2018 NETOP REMOTE CONTROL PORTAL USER S GUIDE

22 August 2018 NETOP REMOTE CONTROL PORTAL USER S GUIDE 22 August 2018 NETOP REMOTE CONTROL PORTAL USER S GUIDE CONTENTS 1 Overview... 3 1.1 Netop Remote Control Portal... 3 1.2 Technical Requirements... 3 2 General... 4 2.1 Authentication... 4 2.1.1 Forgot

More information

SCOUT SUSPENSE TRACKER Version 10.0

SCOUT SUSPENSE TRACKER Version 10.0 SCOUT SUSPENSE TRACKER Version 10.0 USER S MANUAL For Civilian Personnel Management Service (CPMS) HPC-COM LLC Help Desk 800-795-1902 Updated: February 2011 Table of Contents SCOUT Suspense Tracker V10.0

More information

All hardware and software names are brand names and / or trademarks of their respective manufacturers.

All hardware and software names are brand names and / or trademarks of their respective manufacturers. TecWeb 5.0 User Manual Version: 1.8 (Release 8) Author: TecCom Solution Management Date: 05.12.2017 Supported browsers: Internet Explorer 11 Edge Firefox Chrome The compilation of texts and pictures was

More information

EMS WEB APP User Guide

EMS WEB APP User Guide EMS WEB APP User Guide V44.1 Last Updated: August 14, 2018 EMS Software emssoftware.com/help 800.440.3994 2018 EMS Software, LLC. All Rights Reserved. Table of Contents CHAPTER 1: EMS Web App User Guide

More information

Amazon WorkMail. User Guide Version 1.0

Amazon WorkMail. User Guide Version 1.0 Amazon WorkMail User Guide Amazon WorkMail: User Guide Copyright 2017 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection

More information

1. Federation Participant Information DRAFT

1. Federation Participant Information DRAFT INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES [NOTE: This document should be considered a as MIT is still in the process of spinning up its participation in InCommon.] Participation in InCommon

More information

Oracle Cloud. Content and Experience Cloud ios Mobile Help E

Oracle Cloud. Content and Experience Cloud ios Mobile Help E Oracle Cloud Content and Experience Cloud ios Mobile Help E82090-01 February 2017 Oracle Cloud Content and Experience Cloud ios Mobile Help, E82090-01 Copyright 2017, 2017, Oracle and/or its affiliates.

More information

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines:

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines: FACEBOOK SAFETY FOR JOURNALISTS Thanks to these partners for reviewing these safety guidelines: 10 STEPS TO KEEP YOURSELF SAFE Journalists are using Facebook in innovative ways to do their jobs, tell stories,

More information

#1 Enterprise File Share, Sync, Backup and Mobile Access for Business

#1 Enterprise File Share, Sync, Backup and Mobile Access for Business #1 Enterprise File Share, Sync, Backup and Mobile Access for Business Top 10 Benefits 1 Best ROI in the Industry Lower cost, higher value, free unlimited partner accounts 2 4 Site Sandbox 7 The Best Return

More information

CHAPTER 1 - INTRODUCTION...2 WHAT IS ISUPERSUITE?...2 WEB-BASED APPLICATION...3 CHAPTER 2 - INSTALLATION CONFIGURATIONS...4 STANDALONE...

CHAPTER 1 - INTRODUCTION...2 WHAT IS ISUPERSUITE?...2 WEB-BASED APPLICATION...3 CHAPTER 2 - INSTALLATION CONFIGURATIONS...4 STANDALONE... CHAPTER 1 - INTRODUCTION...2 WHAT IS ISUPERSUITE?...2 WEB-BASED APPLICATION...3 CHAPTER 2 - INSTALLATION CONFIGURATIONS...4 STANDALONE...4 LOCAL AREA NETWORK...4 WIDE AREA NETWORK...4 CHAPTER 3 - SECURITY...5

More information

Acronis Data Cloud Version 7.8

Acronis Data Cloud Version 7.8 Acronis Data Cloud Version 7.8 PARTNER'S GUIDE Revision: 10/5/2018 Table of contents 1 About this document...3 2 About Acronis Data Cloud...3 2.1 Services and offerings... 3 2.2 User accounts and tenants...

More information

Mobile Banking Online Banking Features Dashboard Pending Transactions Account Export Bill Pay Online Bill Pay

Mobile Banking Online Banking Features Dashboard Pending Transactions Account Export Bill Pay Online Bill Pay 3 5 6 6 7 8 Desktop need to use the last 4 digits of their social security number or Telephone banking/dial PIN as their password. If help is needed logging on, please call Member Services and a representative

More information

NextGen Patient Portal. User Guide.

NextGen Patient Portal. User Guide. 2.4.3 NextGen Patient Portal User Guide www.nextgen.com Copyright 2014-2017 QSI Management, LLC. All Rights Reserved. The registered trademarks listed at http://www.qsii.com/legal_notices.shtml are the

More information

VST Hospital Administrator Guide. Version 2.0.4

VST Hospital Administrator Guide. Version 2.0.4 VST Hospital Administrator Guide Version 2.0.4 Notice Copyright 2002- Vocera Communications, Inc. All rights reserved. Vocera is a registered trademark of Vocera Communications, Inc. This software is licensed,

More information

ForumPass Familiarization Participant Workbook June 2018

ForumPass Familiarization Participant Workbook June 2018 ForumPass Familiarization Participant Workbook June 2018 1 F O R U M P A S S DOCUMENT OBJECTIVES... 3 FORUMPASS PRODUCT SUMMARY... 3 MICROSOFT SHAREPOINT PLATFORM... 3 FORUMPASS EXCLUSIVE FEATURES... 4

More information