Using Voltage SecureMail

Contents:

Receiving Secure Email

Receiving Secure Email

How do I read a secure email?

To read your secure email, click the "message_zdm.html" attachment. Next, click the "Read Message" button on the page that opens in your web browser.

To complete the process, you will be asked to authenticate yourself in the manner designated by the company you are communicating with. When the authentication process completes, the secure email will be displayed in your web browser.

How do I access attachments sent to me?

All secure attachments are contained within a single Zero Download Messenger package to enable easy access. To open the attached files, click on the [view] button next to the attachment names - a new browser window will open to enable you to access the attachment.

What are signatures and what does it mean if the signature is valid with ?

Every secure email is signed by the sender of the message to ensure authenticity of the sender and data integrity of the message. The indicates that the signature associated with this email is valid and the message can be trusted.

What are signatures and what does it mean if the signature is invalid with ?

Every secure email message is signed by the sender of the message to ensure authenticity of the sender and data integrity of the message. The means that the signature associated with this message is not valid and the message may have been forged. We recommend that you either contact the sender of the message or technical support at helpdesk@thecoventry.co.uk.

Sending Secure Email

Initiating Secure Email

How do I initiate a secure email?

If permitted by the company you are communicating securely with, you can have the option to initiate a secure email through a provided webpage link. To do so:

  • Go the provided webpage to create your secure email.
  • Sign in by entering your email address and click "Sign In".
  • At this point, you will be asked to authenticate yourself in the required manner designated by the company you are communicating with.
  • Upon completion of the authentication process, a compose page will be displayed.
  • Email addresses can be added into the To: field and separated with commas, semi-colons or blank spaces. You may also add new email addresses in the Cc and Bcc fields (available by clicking "Show Bcc").
  • Enter the subject of your message in the Subject: field.
  • Compose your message in the large text box
  • To attach a file to your secure email, click on "Choose File..." to select a file from your computer.
  • Once you have completed the above steps, click on the "Send Secure" button to send the message.

How do I add an attachment to the secure email?

If permitted by the company you are communicating securely with, you can have the option to add an attachment to your email.

You can send all types of files as attachments, including word processor or spreadsheet documents, audio files, image files, web pages saved as HTML files, and more.

To add attachments to your secure email:

  • Click the "Choose File..." link located adjacent to the Attach field.
  • After choosing a file, it will begin uploading immediately.
  • Once the file has been uploaded, the compose page will be updated with the name of the file. A remove link is provided to allow you to remove an attachment.

How do I get a copy of the secure email that I have composed?

You may get a copy of the secure email that you have composed sent back to your email address. By default, this is enabled by clicking the "Copy Me" link next to the "To" field. When you click the "Send Secure" button, an exact same copy of the composed secure email is sent to your email account. If you do not want to have a copy of the secure email, you may click the "Remove Me" link directly below or to the right of the "To" field.

Using Message Receipts

How do I know that the recipients were able to decrypt the secure message?

You can request that a receipt message is sent to your email address when each recipient decrypts a secure message you send. To receive message receipts, click or tap Request Receipt. If you do not wish to receive a receipt email when the message is decrypted, click to clear the Remove Receipt check box. The Request Receipt check box is only available if the administrator of the company with which you are communicating securely has enabled it. If you do not see this check box, you cannot request a receipt.

Cookies

Cookies

This site uses cookies that are essential to the running of the secure mail service. To understand more about how we use cookies, please see our Privacy and cookies policy

Email Encryption Provided by Voltage SecureMail. Learn Moreabout secure email and identity based encryption