About 27,500 results
Open links in new tab
  1. Encryption ted and Guest users can encrypt files / packages before hey are sent. NOTE: NO CLASSIFIED INFORMATION IS ALLOWED ON DOD SAFE. Any files containing PII/PHI must …

  2. Aug 2, 2018 · To remove a recipient, highlight their name and click the "Remove" button; Caveats - Default is "None"; Encrypt email message when possible - Attempt to encrypt the package's …

  3. A/I/T FENS-NCMS-IRD-0007 / Data Service FENS must encrypt all data transmission from SDI to SDI in accordance with the applicable requirements in Attachment J-7a. A/I/T FENS-NCMS …

  4. Encrypt organizational wireless connections and use encrypted wireless connections where available when traveling. If encrypted wireless is not available, encrypt document files

  5. Encrypt all sensitive federal data and information (i.e., PII, protected health information [PHI], proprietary information, etc.) in transit (i.e., email, network connections, etc.) and at rest (i.e., …

  6. Encrypt the information that has been identified as CUI when it is stored on mobile computing devices such as laptops and personal digital assistants, or removable storage media such as …

  7. ed FIPS algorithm in place to encrypt all devices to include System logs. The Contractor shall account for and address all DoD IA Controls assigned to a designated categorization as High, …

  8. Oct 31, 2018 · time stamp, encrypt, and control access to audit trails and log files. The Vendor shall ensure udit logging does not adversely impact system performance figurable access and …

  9. Attachment 1, How to Encrypt Documents Using WinZip Right click on the document you want to zip. Click on WinZip then Add to Zip file. Open the zip file wherever it is saved. Switch the …

  10. Manage My DoD ECA Certificates Manage My TLS/SSL Certificates Renew, Replace or Initiate a Key Recovery Sign and Encrypt Email Communications Policies – Current and Archived DoD …