GE Security - Newjerseymls

2y ago
1.16 MB
50 Pages
Last View : 30d ago
Last Download : 1y ago
Upload by : Evelyn Loftin

GESecurityeKEY BlackBerry User Manualg

iiCopyrightCopyright 2008 GE Security, Inc. All rights reserved.Document number 10102184P1-01 (February 2009)DisclaimerThe information in this document is subject to change without notice. GE Security (“GE”) assumes noresponsibility for inaccuracies or omissions and specifically disclaims any liabilities, losses, or risks,personal or otherwise, incurred as a consequence, directly or indirectly, of the use or application of anyof the contents of this document. For the latest documentation, contact GE Security or visit us online publication may contain examples of screen captures and reports used in daily operations.Examples may include fictitious names of individuals and companies. Any similarity to names andaddress of actual businesses or persons is entirely coincidental.Trademarks andpatentsGE, the GE monogram, Supra, and eKEY are registered trademarks of General Electric Company.Bluetooth and the Bluetooth logo are trademarks of Bluetooth SIG. BlackBerry and the BlackBerry logoare registered trademarks of Research in Motion (RIM).Other trade names used in this document may be trademarks or registered trademarks of themanufacturers or vendors of the respective products.Intended useRules and regulationsrelating to the use ofthe serviceUse this product only for the purpose it was designed for. For the latest product information, contact GESecurity or visit us online at Possession. Each keyholder (“Keyholder”) is responsible for the key (“Key”) issued to him or her.Current Update. The Key must be updated in order to access keyboxes (“Keyboxes”). The Key cannot beupdated unless the Keyholder is in good standing with the organization (“Organization”) and GE Security,Inc. (“GE”), is authorized to use the Service, and is in compliance with the obligations for the use of theService including, without limitation, these rules and regulations.Equipment Security. It is necessary to maintain the security and the personal identification number(“PIN”) of the Key to prevent the use of the Key and the Service by unauthorized persons. Each person inpossession of a Key, whether such Key is being actively used or not, shall abide by the following termsand conditions:To keep the Key in authorized Keyholder’s possession or in a safe place at all times;Not to allow the PIN for the Key to be displayed on or attached to the Key for any purpose whatsoeveror to be disclosed to any third party;Not to lend or otherwise transfer the Key to any other person or entity, or permit any other personor entity to use the Key for any purpose whatsoever, whether or not such other person or entity isauthorized to use the Key;Not to duplicate the Key or allow any other person to do so;Not to assign, transfer or pledge the Key;Not to (i) destroy, alter, reproduce, modify, adapt, translate, reverse engineer, de-compile, disassemble ortamper with the Key or knowingly or unknowingly allow anyone else to do so; or (ii) provide or otherwisemake available the software or any part or copies thereof to any third party;To notify your Organization or GE within forty-eight (48) hours if the Key is lost or stolen;To follow all additional security procedures as specified by your Organization; andTo safeguard the code for each Keybox from all other individuals and entities, whether or not they areauthorized users of the service.KeyBox Authorization. Before a Keybox is installed or used on any piece of real property, the priorwritten authorization to install or use a Keybox must be obtained from the property owner, as well asfrom any tenant(s) in possession of the property, if applicable. Extreme care shall be used to ensure thatall doors to the listed property and the Keybox are locked. All owners and/or tenant(s) of real propertyshall be informed that the Keybox is not designed to be, or intended as, a security device.

iiiContentsPreface.vChapter 1Introduction. 1Overview.2Requirements. 2eKEY software. 2eKEY Fob. 2KIM. 3eKEY Setup.4Install eKEY Software. 4Authorize eKEY. 4Pair your BlackBerry and eKEY Fob. 5Customize PIN. 6Customize Font Size. 6Audio Settings. 7Chapter 2Updating. 8Updating.9Manually Updating. 9Disable Automatic Update.10Chapter 3KeyBoxes. 12Accessing KeyBoxes. 13eKEY fob.13Releasing the Key Container.13Placing Listing Keys in the iBox.14Feedback.14Showing Hours.15Call Before Showing (CBS) codes.15Cooperating.15Releasing the Shackle .16Removing the Shackle.16KeyBox Inventory. 17View KeyBox Inventory List.17Add KeyBox to your Inventory.17Delete a KeyBox from your Inventory.18View Activity.19Changing KeyBox Settings.20Chapter 4MLS Data. 22eDATA. 23Market Area.23Update Listings.25Settings for eKEY Professional.25View Listings.26Delete Listings.29Roster. 30View Roster.30Delete Roster.31

ivProfiles. 32Chapter 5Showing Activity. 34Showing Activity. 35Showing Notifications and Messages.35Showing Activity Email.36Showing Activity Reports at KIM Website.37Showings Activity in eDATA.38KIM Voice Access.39Chapter 6Support and Troubleshooting. 40Support. 41eKEY Serial Number.41Troubleshooting. 42Check for eKEY Software Updates.42eKEY Software Troubleshooting Information.42Appendix A: BlackBerry Storm Addendum. 43Appendix B: SafeMLS. 44Index. 45

PrefaceThis is the GE eKEY BlackBerry User Manual. This document includes an overview of the product and detailedinstructions explaining: how to set up your eKEY software; how to update your eKEY software; how to access KeyBoxes; and how to view showing activity.There is also information describing how to contact technical support if you have questions or concerns.For specific information about your BlackBerry, refer to the documentation that was provided with yourBlackBerry. For additional information on using your Supra eKEY software, visit and clickon the Agent Education Resources link.The following conventions are used in this document:BoldMenu items and buttons.ItalicEmphasis of an instruction or point; special terms.File names, path names, windows, panes, tabs, fields, variables, and other GUI elements.Titles of books and various documents.Blue italic(Electronic version.) Hyperlinks to cross-references, related topics, and URL addresses.MonospaceText that displays on the computer screen.Programming or coding sequencesSafety terms and symbolsThese terms may appear in this manual:CAUTION: Cautions identify conditions or practices that may result in damage to the equipment or other property.WARNING: Warnings identify conditions or practices that could result in equipment damage or serious personal injury.

Chapter 1IntroductionChapter 1 IntroductionThis chapter provides an overview of the eKEY software and explains how to setup your eKEY software.In this chapter:Overview. 2Requirements . 2eKEY software. 2eKEY fob. 3KIM. 3eKEY Setup. 4Install eKEY Software. 4Authorize eKEY. 4Pair your BlackBerry and eKEY fob. 5Customize PIN. 6Audio Settings. 6

Chapter 1IntroductionOverviewThe eKEY software and eKEY fob allow your eKEY-certified BlackBerry to access to Supra iBoxes placed atreal estate listings.Requirements BlackBerry OS version 4.2.1 or greater eKEY-certified BlackBerry device; to see which BlackBerry devices are supported go and click on the Certified eKEY Devices link Internet data plan on your BlackBerry through your cellular provider eKEY fobeKEY softwareThere are four icons on the eKEY Home screen: Obtain Key – Obtain listing keys from a keybox Open Shackle – Open the shackle on a keybox Inventory – Manage and view your keybox inventory, change settings in your keyboxes, and viewshowing information from a KeyBox Read eDATA – MLS information for eKEY Professional subscribersFigure 1.eKEY Home screenThe eKEY software connects regularly to the Supra network using your BlackBerry’s Internet service. Duringthe connection, showing data is sent to the Supra network, the eKEY software is updated, and messages andshowing notifications are received.eKEY FobThe BlackBerry communicates using Bluetooth technology while the iBox communicates using infraredtechnology. The eKEY fob is a device used to translate the Bluetooth signal from your BlackBerry to aninfrared signal that can be recognized by the iBox. See the eKEY fob instructions for more information on theeKEY fob.

Chapter 1IntroductionKIMKIM, the KeyBox Information Manger, is the Supra network that maintains the key and keybox data. Webaccess to KIM is available at Automated voice access to KIM is available by calling888‑968-4032.

Chapter 1IntroductioneKEY SetupThis section explains how to install the eKEY software onto your BlackBerry and authorize the applications.Install eKEY SoftwareThe eKEY software is installed over-the-air using your BlackBerry’s Internet browser. You must have Internetaccess and an Internet data plan on your BlackBerry to install and use the eKEY software or you may incuradditional charges from your cellular provider.To install the eKEY software on your BlackBerry device:1. On your Blackberry, launch the Browser by selecting the Browser icon. On some BlackBerry devices,the MediaNet icon launches the Internet browser.2. Press the Menu button.3. Select Go To to navigate to a page.4. Navigate to: www.ekeymobile.com5. Select the Download Supra eKEY link to download and install the eKEY software.6. If the application asks to confirm permission changes, press the Menu button and then Save.The eKEY icon is now shown in the list of applications on your BlackBerry. On some devices, the eKEY icon isplaced in the Applications or Downloads folder.Figure screenAuthorize eKEYOnce the eKEY software is installed, it must be authorized before it can be used. To authorize the eKEYsoftware, you’ll need your 30-digit Authorization code.New eKEY users can obtain an authorization code from the Association/Board/MLS. Existing eKEY users canobtain an authorization code by logging into KIMweb and selecting the Authorization Code link.To authorize your eKEY software.1. Launch the eKEY application by selecting the eKEY icon.

Chapter 1Introduction2. Following the onscreen prompts, enter your 30-digit Authorization code and press Enter.Figure 3.

BlackBerry OS version 4.2.1 or greater eKEY-certified BlackBerry device; to see which BlackBerry devices are supported go to and click on the Certified eKEY Devices link Internet data plan on your BlackBerry through your cellular provider eKEY fob eKEY software There are four icons on the eKEY Home screen:

Related Documents:

AVG Internet Security 9 ESET Smart Security 4 F-Secure Internet Security 2010 Kaspersky Internet Security 2011 McAfee Internet Security Microsoft Security Essentials Norman Security Suite Panda Internet Security 2011 Sunbelt VIPRE Antivirus Premium 4 Symantec Norton Internet Security 20

Slack’s security team, led by our Chief Security Officer (CSO), is responsible for the implementation and management of our security program. The CSO is supported by the members of Slack’s Security Team, who focus on Security Architecture, Product Security, Security Engineering and Opera

3 CONTENTS Notation 10 Preface 12 About the Author 18 PART ONE: BACKGROUND 19 Chapter 1 Computer and Network Security Concepts 19 1.1 Computer Security Concepts 21 1.2 The OSI Security Architecture 26 1.3 Security Attacks 27 1.4 Security Services 29 1.5 Security Mechanisms 32 1.6 Fundamental Security Design Principles 34 1.7 Attack Surfaces and Attack Trees 37

Within the guidance provided by these security foundations, two sets of concepts are particularly relevant to the design and understanding of the AWS SRA: security epics (also called security areas) and security design principles. Security epics Both the security perspective of the AWS CAF and the security pillar of Well-Architected

Chapter 6 Security in the Cloud 153 6.1 Chapter Overview 153 6.2 Cloud Security Challenges 158 6.3 Software-as-a-Service Security 162 6.3.1 Security Management (People) 164 6.3.2 Security Governance 165 6.3.3 Risk Management 165 6.3.4 Risk Assessment 165 6.3.5 Security Portfolio Management 166 6.3.6 Security Awareness 166

Cybersecurity is one part of a larger security plan A security plan serves as a management tool to guide a facility's security and response efforts. A strong security plan integrates all major security goals into a holistic approach. This reduces duplication of effort and allows facilities to identify security gaps. Facility Security Plan

organization level helps react to security situations better. A security model is a formal description of a security policy, which in turn captures the security requirements of an enterprise and describes the steps that must be taken to achieve security. The goal of implementing a security model is to provide information assurance. FCPB security

Samy T. (Purdue) Rough Paths 4 Aarhus 2016 27 / 67. Russo-Vallois’symmetricintegral Let φbearandompath Then Z b a φ w d Bi w L 2 lim ε 0 1 2ε Z b a φ w Bi w ε B i w ε dw, providedthelimitexists. Definition9. gralcoincideswith Young’sintegralifH 1/2andφ C1 H ε Stratonovich’sintegralintheBrowniancase Samy T .