A complete guide to accessing and managing your secure documents with industry-leading security protocols
Secure Login Process
Email Authentication
Enter the email address that was registered with your Arcuity account. This creates your unique security profile and cannot be shared with other users.
Password Security
Use the secure password provided during account setup. For optimal security, ensure you're accessing from the same device and browser used during registration.
Security Notice: Access credentials are tied to your specific email address and cannot be shared or transferred to other users.
Security Verification Process
After successful login, Arcuity performs comprehensive security verification to ensure authorized access. This critical process validates your credentials, checks device authentication, and establishes secure connections to protected workspaces.
Wait for Complete Processing
Allow the verification screen to fully load without interruption. Premature navigation or browser refresh may cause access issues and require re-authentication.
Secure Connection Establishment
The system establishes encrypted connections to all accessible workspaces and validates your permission levels for each secure environment.
Dashboard Navigation Overview
The Arcuity dashboard provides three primary functions for secure document management. Each option serves distinct purposes in your secure workflow, with My Workspaces being the primary focus for accessing shared secure documents.
01
Send Items
Upload and securely transmit documents to other authorized users through encrypted channels.
02
My Workspaces
Access collaborative secure environments where documents are shared among authorized team members.
03
View History
Review your document access logs and transmission history for audit and compliance purposes.
Accessing Your Workspaces
Permission-Based Access Control
Workspaces appear in your dashboard only when you have been explicitly granted access by workspace administrators. This ensures that sensitive documents remain visible only to authorized personnel.
01
View Available Workspaces
Only workspaces where you have active permissions will be displayed in your interface.
02
Select Target Workspace
Click on the workspace name to access the secure document environment.
03
Confirm Access Rights
Your permission level determines whether you can view, download, or contribute to the workspace.
Workspace Interface and Secure Sharing
Within each workspace, you'll find an organized file and folder structure designed for secure collaboration. The interface provides intuitive navigation while maintaining strict security protocols for all document interactions.
Secure Sharing Link: The link displayed at the bottom of the workspace is encrypted and can only be accessed by users with proper registration and permissions.
File Organization
1
Documents are organized in a familiar folder structure
2
File types and sizes are clearly indicated
3
Access permissions are enforced at the file level
4
Version history is maintained automatically
Notification Settings Management
Access notification settings through the gear icon in your workspace interface. Proper notification configuration ensures you stay informed about important workspace activity while maintaining security protocols.
Important: Notifications are disabled by default and must be manually enabled to receive workspace activity updates.
Never
Completely disable all notifications for this workspace. Choose this for workspaces where you prefer to check updates manually.
Immediately
Receive instant notifications for all workspace activity including document uploads, modifications, and access attempts.
Daily Summary
Get consolidated daily reports summarizing all workspace activity from the previous 24 hours.
Security Best Practices
Never Bookmark URLs
Avoid saving workspace URLs as bookmarks. Security protocols require fresh authentication tokens that become invalid over time.
Use Secure Email Links
Always access your workspaces through secure links sent to your registered email address. These contain encrypted authentication tokens.
Consistent Device Usage
Use the same device and browser that was used during initial registration whenever possible for optimal security verification.
Monitor Notifications
Regularly check and configure your notification settings to stay informed about workspace activity and potential security events.
Security Protocol Summary
Multi-Layer Protection
Arcuity implements enterprise-grade security measures to protect your sensitive documents throughout every interaction.
Email-Based Authentication
Your unique email address serves as the primary authentication key, preventing unauthorized access attempts.
Device Verification
The system recognizes and validates trusted devices to ensure consistent secure access patterns.
Encrypted Transmission
All data transfers use military-grade encryption to protect documents during transmission and storage.
Permission Management
Granular access controls ensure users can only view and interact with authorized workspaces and documents.
Ready to Get Started?
You now have the knowledge to securely access and manage your documents through the Arcuity platform
01
Access Through Secure Email Link
Click the secure link sent to your registered email address to begin the authentication process.
02
Complete Security Verification
Allow the system to fully process your credentials and establish secure connections to your workspaces.
03
Navigate to Your Workspace
Select "My Workspaces" and choose the appropriate secure environment for your document needs.
04
Configure Notification Preferences
Set up your notification settings to stay informed about workspace activity and security updates.
Remember: Security is a shared responsibility. Following these best practices ensures the protection of your sensitive documents and maintains the integrity of the Arcuity platform.
Questions? Email us at support@arcuity.com or call 844.272.8489 and one of our team will be happy to help.