Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
passpush:setup-passpush [2024/11/06 17:33] – cdc.admin | passpush:setup-passpush [2024/11/06 17:40] (current) – cdc.admin | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | You can use the following link to send confidential information to another person | + | You can use the following link to send confidential information to another person in an email:\\ |
[[https:// | [[https:// | ||
- | {{: | + | {{: |
Enter in the information that you would like to send to someone else in the text area provided:\\ | Enter in the information that you would like to send to someone else in the text area provided:\\ | ||
- | {{: | + | {{: |
- | You should leave the default options as shown unless you have a good reason to change them. Please let the person that you will be sending the link to that they only have 2 days to retrieve the information | + | You should leave the default options as shown unless you have a good reason to change them. Please let the person that you will be sending the link to know that they only have 2 days to retrieve the information |
- | {{: | + | {{: |
- | When you are ready to send the information, | + | When you are ready to send the information, |
- | {{: | + | {{: |
- | You can either hightlight | + | This will create |
- | The concept behind this is if the user you share this link with clicks the link and gets either of these messages:\\ | + | |
- | {{: | + | {{: |
+ | |||
+ | You can either hightlight the link created or click on the clipboard icon beside the link. You can paste this link in an email to the user you would like to share this information with.\\ | ||
+ | The concept behind this is if the user you share this link with clicks the link and gets either of these messages (The important part in the first screen shot is the **2 days or 0 more views**): | ||
+ | |||
+ | {{: | ||
or: | or: | ||
- | {{: | + | {{: |
Then the email has been intercepted and the information is compromised. | Then the email has been intercepted and the information is compromised. |