SlideShare uma empresa Scribd logo
1 de 26
Scanning & Password Protecting  Documents for E-mail. Created & Presented By: Kelly McDavid
T he Following is a View of a  Typical Scanner Option Menu:
 
[object Object],[object Object],[object Object],Name the File:  Save as Type: Portable Document File .pdf, Tagged Image File Format, tif (tiff) or as a Word Document, .doc.
[object Object],[object Object],[object Object],[object Object]
S aving a document as a  tagged Image File Format, tif  then converting the document into a  Word Document, .doc. If your scanner does not have a Portable Document File or Word, .doc setting, please follow these instructions to save as a .tif file, (Tagged Image File Format) and then convert  the document into a Word, .doc.
The Following Example is for Microsoft Office 2003 Select Scan New Document. Select type of document to be scanned such as a black and white text. Select Multiple images or pages if needed. Go to Start, Programs, Microsoft Office Tools then Microsoft Document Scanning.
[object Object],Save File. To save the file select File, Save As and then select the location where the file is to be saved such as your C: Drive or your My Documents folder. Name the File
[object Object],Open the document.  Adjust the quality if needed using your Advanced settings. Save the document and close.
Delete .tif and replace with .doc Select open to open the document, the document with then open using Microsoft Word. If you receive a File Converter Prompt select  cancel . Go to the file location and right click on the document and select Rename.
Password Protecting Using Word This is especially useful if the document contains sensitive information (such as social security numbers and/or medical information).  There is a special feature within Microsoft Word in which allows you to password-protect your documents.
[object Object],Tools menu. Select Options and then select the Security sub-tab.
You Will Then See This Box:
Press the save (or the ok) button at the bottom. Do not  use the Save option in the sub-tab .   Enter security (District Set Password, lowercase); then enter it again to confirm.
[object Object],[object Object],The next time the document is opened, the user will be prompted for the password (security).
Microsoft Free On-Line Training: ,[object Object]
Please Note: ,[object Object],[object Object],[object Object],You do have the option of saving the document first then you can assign a password or  you can assign the password first then save the document. Make sure to save the document again  prior to closing the file.
Portable Document Files (.pdf): ,[object Object],Please follow along closely to the following information  as this will ensure compliance with the Health Insurance Portability and Accountability Act (HIPAA) laws and regulations without spending $300.00 - $450.00.
If your scanner does not have this capability please refer to your manual or contact the manufacturer of your scanner. Calling Adobe Acrobat Reader not only is it  not  recommended it is not needed as they will just encourage you to purchase their product. First of all most scanners come with software that allows your documents to be scanned and then saved as a (Portable Document File) .pdf.
Primo or any Printer/Converter Utility allows you to convert any document into a .pdf from any file that you can print such as Power Point, Word, or Excel through your printer settings.  Please visit:  http://www.primopdf.com/  for installation and more information. An additional option is downloading a Printer Converter/Utility such as Primo.
Please visit:  http://www.winzip.com/index.htm   for installation and more information. If  you use a utility program such as Primo, you will then need to download WinZip in order to password protect the document by way of a Zip File. WinZip is a software program that allows you to compress files for reasons such as securing and safeguarded personal information using a Zip format.
Password Protecting a  Document That Has Been Saved to a Zip File:
Security (lowercase) is the chosen password for the District. In order for WinZip to later extract the original contents of the encrypted files, the correct password must again be supplied. The contents of the files that you want to protect are encrypted by WinZip based on a password that you specify.
Encryption is the translation of data into a secret code.  Encryption is the most effective way to achieve data security. To read an encrypted file you must have access to a secret key or password that enables you to decrypt the file. Unencrypted data is called plain text; encrypted data is referred to as cypher text. Encryption:
You Can Encrypt Files Using  WinZip in Two Ways: To Encrypt files already in a Zip file: open the Zip file using WinZip and choose Encrypt from the Actions menu; or, right click the Zip file in Windows Explorer and choose Encrypt from the WinZip context menu.  To Encrypt files while you are adding them simply check the added files check box in the add dialogue, this is the most efficient way to encrypt your files.
Happy Scanning!!! ,[object Object],[object Object],Kelly McDavid  PH:(863) 413-3363  or  E-Mail: Kelly_McDavid@apd.state.fl.us

Mais conteúdo relacionado

Mais procurados

Tutorial for Zotero Deduplication
Tutorial for Zotero DeduplicationTutorial for Zotero Deduplication
Tutorial for Zotero Deduplicationjstaaks
 
EndNote And EndNote Web 2010
EndNote And EndNote Web 2010EndNote And EndNote Web 2010
EndNote And EndNote Web 2010H. Stephen McMinn
 
Lecture4 working with_word_processing
Lecture4 working with_word_processingLecture4 working with_word_processing
Lecture4 working with_word_processingBBAMUMU2014
 
Introduction to Endnote
Introduction to EndnoteIntroduction to Endnote
Introduction to Endnotedh895
 
A database introduction
A database introductionA database introduction
A database introductionTushar Desarda
 
ppt on open office.org
ppt on open office.orgppt on open office.org
ppt on open office.orgDeepansh Goel
 
How to build a data dictionary
How to build a data dictionaryHow to build a data dictionary
How to build a data dictionaryPiotr Kononow
 

Mais procurados (19)

MS Access 2010 tutorial 1
MS Access 2010 tutorial 1MS Access 2010 tutorial 1
MS Access 2010 tutorial 1
 
Automatic file naming and routing for scanned documents and existing files.
Automatic file naming and routing for scanned documents and existing files.  Automatic file naming and routing for scanned documents and existing files.
Automatic file naming and routing for scanned documents and existing files.
 
Tutorial for Zotero Deduplication
Tutorial for Zotero DeduplicationTutorial for Zotero Deduplication
Tutorial for Zotero Deduplication
 
What is Batch Document Processing? A tutorial for document capture.
What is Batch Document Processing?  A tutorial for document capture.What is Batch Document Processing?  A tutorial for document capture.
What is Batch Document Processing? A tutorial for document capture.
 
EDD Process
EDD ProcessEDD Process
EDD Process
 
Batch Document Processing with ImageRamp Batch
Batch Document Processing with ImageRamp BatchBatch Document Processing with ImageRamp Batch
Batch Document Processing with ImageRamp Batch
 
Databases
DatabasesDatabases
Databases
 
8 Document Capture Must Haves, a Document Management Tutorial
8 Document Capture Must Haves, a Document Management Tutorial8 Document Capture Must Haves, a Document Management Tutorial
8 Document Capture Must Haves, a Document Management Tutorial
 
Endnote FAQs
Endnote FAQsEndnote FAQs
Endnote FAQs
 
Database basics
Database basicsDatabase basics
Database basics
 
EndNote And EndNote Web 2010
EndNote And EndNote Web 2010EndNote And EndNote Web 2010
EndNote And EndNote Web 2010
 
Lecture4 working with_word_processing
Lecture4 working with_word_processingLecture4 working with_word_processing
Lecture4 working with_word_processing
 
Introduction to Endnote
Introduction to EndnoteIntroduction to Endnote
Introduction to Endnote
 
End Note Web 2009
End Note Web 2009End Note Web 2009
End Note Web 2009
 
EndNote Basics 2016
EndNote Basics 2016EndNote Basics 2016
EndNote Basics 2016
 
A database introduction
A database introductionA database introduction
A database introduction
 
ppt on open office.org
ppt on open office.orgppt on open office.org
ppt on open office.org
 
Improve OCR Accuracy, Clean Up and Enhance Scanned Images
Improve OCR Accuracy, Clean Up and Enhance Scanned ImagesImprove OCR Accuracy, Clean Up and Enhance Scanned Images
Improve OCR Accuracy, Clean Up and Enhance Scanned Images
 
How to build a data dictionary
How to build a data dictionaryHow to build a data dictionary
How to build a data dictionary
 

Semelhante a Scanning & Password Protecting Docs

Acrobatic Documents
Acrobatic DocumentsAcrobatic Documents
Acrobatic DocumentsJohn Hopkins
 
How to Recover Corrupted Word File
How to Recover Corrupted Word FileHow to Recover Corrupted Word File
How to Recover Corrupted Word FileJohn Park
 
Turn Piles Into Files With Dymofile
Turn Piles Into Files With DymofileTurn Piles Into Files With Dymofile
Turn Piles Into Files With DymofileLabelValue.com
 
Adobe Acrobat Pro X - 2014 UVM Extension Professional Improvement Conference
Adobe Acrobat Pro X - 2014 UVM Extension Professional Improvement ConferenceAdobe Acrobat Pro X - 2014 UVM Extension Professional Improvement Conference
Adobe Acrobat Pro X - 2014 UVM Extension Professional Improvement ConferenceCathy Yandow
 
Backing Up And Working With Digital Documents
Backing Up And Working With Digital DocumentsBacking Up And Working With Digital Documents
Backing Up And Working With Digital DocumentsNancy Duhon
 
Quick Start Guide.pdf
Quick Start Guide.pdfQuick Start Guide.pdf
Quick Start Guide.pdfpa jo
 
Wounds to Wisdom Lessons Learned
Wounds to Wisdom Lessons LearnedWounds to Wisdom Lessons Learned
Wounds to Wisdom Lessons LearnedIpro Tech
 
OfficeBox User Guide
OfficeBox User GuideOfficeBox User Guide
OfficeBox User GuideDirectReader
 
Fortigate Firewall How to - DLP
Fortigate Firewall How to - DLPFortigate Firewall How to - DLP
Fortigate Firewall How to - DLPIPMAX s.r.l.
 
Office box user_guide_v3.0
Office box user_guide_v3.0Office box user_guide_v3.0
Office box user_guide_v3.0Jiransoft
 
Personal Data Managent
Personal Data ManagentPersonal Data Managent
Personal Data ManagentM. Imran Iqbal
 
Elements of Streamlined Online Course Design
Elements of Streamlined Online Course DesignElements of Streamlined Online Course Design
Elements of Streamlined Online Course DesignD2L Barry
 
Hardware, Software and computer management.pptx
Hardware, Software and computer management.pptxHardware, Software and computer management.pptx
Hardware, Software and computer management.pptxUniversity of Johannesburg
 

Semelhante a Scanning & Password Protecting Docs (20)

Acrobatic Documents
Acrobatic DocumentsAcrobatic Documents
Acrobatic Documents
 
How to Recover Corrupted Word File
How to Recover Corrupted Word FileHow to Recover Corrupted Word File
How to Recover Corrupted Word File
 
C) ICT Application
C) ICT ApplicationC) ICT Application
C) ICT Application
 
Turn Piles Into Files With Dymofile
Turn Piles Into Files With DymofileTurn Piles Into Files With Dymofile
Turn Piles Into Files With Dymofile
 
Adobe Acrobat Pro X - 2014 UVM Extension Professional Improvement Conference
Adobe Acrobat Pro X - 2014 UVM Extension Professional Improvement ConferenceAdobe Acrobat Pro X - 2014 UVM Extension Professional Improvement Conference
Adobe Acrobat Pro X - 2014 UVM Extension Professional Improvement Conference
 
Backing Up And Working With Digital Documents
Backing Up And Working With Digital DocumentsBacking Up And Working With Digital Documents
Backing Up And Working With Digital Documents
 
Quick Start Guide.pdf
Quick Start Guide.pdfQuick Start Guide.pdf
Quick Start Guide.pdf
 
Wounds to Wisdom Lessons Learned
Wounds to Wisdom Lessons LearnedWounds to Wisdom Lessons Learned
Wounds to Wisdom Lessons Learned
 
OfficeBox User Guide
OfficeBox User GuideOfficeBox User Guide
OfficeBox User Guide
 
SysInfoTools MS Word Doc Repair
SysInfoTools MS Word Doc RepairSysInfoTools MS Word Doc Repair
SysInfoTools MS Word Doc Repair
 
Fortigate Firewall How to - DLP
Fortigate Firewall How to - DLPFortigate Firewall How to - DLP
Fortigate Firewall How to - DLP
 
Downloading Steps
Downloading StepsDownloading Steps
Downloading Steps
 
Office box user_guide_v3.0
Office box user_guide_v3.0Office box user_guide_v3.0
Office box user_guide_v3.0
 
Personal Data Managent
Personal Data ManagentPersonal Data Managent
Personal Data Managent
 
Getting Started
Getting StartedGetting Started
Getting Started
 
Comodo presentation
Comodo presentationComodo presentation
Comodo presentation
 
SysInfoTools MS Word DOCM Recovery
SysInfoTools MS Word DOCM RecoverySysInfoTools MS Word DOCM Recovery
SysInfoTools MS Word DOCM Recovery
 
Elements of Streamlined Online Course Design
Elements of Streamlined Online Course DesignElements of Streamlined Online Course Design
Elements of Streamlined Online Course Design
 
Getting Started-1
Getting Started-1Getting Started-1
Getting Started-1
 
Hardware, Software and computer management.pptx
Hardware, Software and computer management.pptxHardware, Software and computer management.pptx
Hardware, Software and computer management.pptx
 

Scanning & Password Protecting Docs

  • 1. Scanning & Password Protecting Documents for E-mail. Created & Presented By: Kelly McDavid
  • 2. T he Following is a View of a Typical Scanner Option Menu:
  • 3.  
  • 4.
  • 5.
  • 6. S aving a document as a tagged Image File Format, tif then converting the document into a Word Document, .doc. If your scanner does not have a Portable Document File or Word, .doc setting, please follow these instructions to save as a .tif file, (Tagged Image File Format) and then convert the document into a Word, .doc.
  • 7. The Following Example is for Microsoft Office 2003 Select Scan New Document. Select type of document to be scanned such as a black and white text. Select Multiple images or pages if needed. Go to Start, Programs, Microsoft Office Tools then Microsoft Document Scanning.
  • 8.
  • 9.
  • 10. Delete .tif and replace with .doc Select open to open the document, the document with then open using Microsoft Word. If you receive a File Converter Prompt select cancel . Go to the file location and right click on the document and select Rename.
  • 11. Password Protecting Using Word This is especially useful if the document contains sensitive information (such as social security numbers and/or medical information). There is a special feature within Microsoft Word in which allows you to password-protect your documents.
  • 12.
  • 13. You Will Then See This Box:
  • 14. Press the save (or the ok) button at the bottom. Do not use the Save option in the sub-tab . Enter security (District Set Password, lowercase); then enter it again to confirm.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. If your scanner does not have this capability please refer to your manual or contact the manufacturer of your scanner. Calling Adobe Acrobat Reader not only is it not recommended it is not needed as they will just encourage you to purchase their product. First of all most scanners come with software that allows your documents to be scanned and then saved as a (Portable Document File) .pdf.
  • 20. Primo or any Printer/Converter Utility allows you to convert any document into a .pdf from any file that you can print such as Power Point, Word, or Excel through your printer settings. Please visit: http://www.primopdf.com/ for installation and more information. An additional option is downloading a Printer Converter/Utility such as Primo.
  • 21. Please visit: http://www.winzip.com/index.htm for installation and more information. If you use a utility program such as Primo, you will then need to download WinZip in order to password protect the document by way of a Zip File. WinZip is a software program that allows you to compress files for reasons such as securing and safeguarded personal information using a Zip format.
  • 22. Password Protecting a Document That Has Been Saved to a Zip File:
  • 23. Security (lowercase) is the chosen password for the District. In order for WinZip to later extract the original contents of the encrypted files, the correct password must again be supplied. The contents of the files that you want to protect are encrypted by WinZip based on a password that you specify.
  • 24. Encryption is the translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file you must have access to a secret key or password that enables you to decrypt the file. Unencrypted data is called plain text; encrypted data is referred to as cypher text. Encryption:
  • 25. You Can Encrypt Files Using WinZip in Two Ways: To Encrypt files already in a Zip file: open the Zip file using WinZip and choose Encrypt from the Actions menu; or, right click the Zip file in Windows Explorer and choose Encrypt from the WinZip context menu. To Encrypt files while you are adding them simply check the added files check box in the add dialogue, this is the most efficient way to encrypt your files.
  • 26.