Preview

Getting Started With Employee Self Service

Satisfactory Essays
Open Document
Open Document
383 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Getting Started With Employee Self Service
Getting Started With Employee Self Service
New Roundy’s Computer System Users
If you have not previously logged into a Roundy’s computer system you must create a new password prior to using the OneRoundy’s Employee Self Service system. Click on “Manage My Password” at the top of the OneRoundy’s
Portal Page. Follow the instructions in the “Password Management” section starting on the next page of this document to create your password.
Current Roundy’s Computer System Users
Use your current user ID and password.

Congratulations! You are now ready to use the OneRoundy’s Employee Self Service system.

6/17/2013

Password Management
Roundy’s Password and Account Management Portal allows you to manage the passwords you use for Roundy’s computer systems. Click on “Manage My Password” at the top of the OneRoundy’s Employee Self Service Portal Page to go to begin.

First-Time Roundy’s System Users
If you have not previously logged into a Roundy’s computer system, you are required to create a password prior to using Employee Self Service for the first time. Please perform the following steps.
Existing Roundy’s computer system users do not need to perform these steps.

1. Enter your 6-digit Employee ID.

6/17/2013

2. Select the first option by clicking in the circle to the left of the text “By providing answers to my secret questions”. 3. Enter in the last 4 digits of your Social Security Number.
4. Click the “Submit” button.
6/17/2013

5. You will now need to answer an additional security question. Click the “Close” button.

6. Enter the answer to the additional security question twice.
7. Click the “Submit” button.

6/17/2013

8. Click the check box to the left of “Group: Default”.
9. Enter a new password. Consider a new password that you will remember and enter it in both boxes.
Rules for password:
 Cannot be shorter than 7 characters
 Cannot be larger than 100 characters
 Requires a minimum of 1 letter
 Cannot use first name, last name or userID
 Requires a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    One of the reasons why we have User account maintenance is for security by making sure the user account have a force password change when first logging in to the account to make sure the user have a one of a kind…

    • 935 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    The implementation of McBride's new electronic key cards provides an excellent source of control in the area of physical security. Employees will now only have access to areas that they are authorized to there specific authorization level. Any unauthorized access to any area of any McBride facility will be punishable in accordance with McBride's Non-Compliance Policy. A service charge may be assessed for access cards and/or keys that are lost, stolen, or are not returned. (The Trusted Toolkit, 2007) Lost cards will also be immediately deactivated at the release of a new card. Card access records and visitor logs must also be kept current for routine review based upon the needs of the company.…

    • 897 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Icas Inkwell

    • 359 Words
    • 2 Pages

    Company’s employees do not comply with the policy. Passwords are not kept secret and had not been changed since they were set-up. Every computer uses the same password. Unauthorised people have access to the computers, which may lead to fraud.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Com Data

    • 398 Words
    • 2 Pages

    AUTH. CHECK FP=JUST VERIFY THE AMOUNT AND PRESS F2, PAG NAKITA K NA NO AUTH. FP JUST PRESS F2…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Password Protection

    • 4064 Words
    • 17 Pages

    * Make your password something you can remember. Do not write it down. If you really, honestly forget your password, we can easily give you a new one. We'd rather set your password once a month because you forgot it than have someone find it written down and gain unauthorized access to your account.…

    • 4064 Words
    • 17 Pages
    Good Essays
  • Good Essays

    Harding Cisco Router

    • 675 Words
    • 3 Pages

    Routers are the basic level of the Internet. It is responsible for the communication through the network, between computers and servers. It is important to secure the routers so the attackers can’t gain information from the routers. There are many ways of securing the routers such as upgrade the operating system, warning banners and disable unneeded services.…

    • 675 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Google Hacking

    • 525 Words
    • 3 Pages

    One can even retrieve the username and password list from Microsoft FrontPage servers by inputting the given microscript in Google search field:…

    • 525 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    · If you cannot change the security settings on a work computer try accessing the service at home or on another…

    • 400 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Remote Access

    • 496 Words
    • 2 Pages

    This two part authentication process would be added to every access point either remotely or locally by any and all employees within Richman Investments. I’ve had to use this device in several of my customer service positions because there was always sensitive information that I didn’t need to see and if there was nothing in place to prevent me…

    • 496 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    could be accessed by the unauthorized user for malicious purpose. Therefore, it is necessary to apply…

    • 3115 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Passport automation system

    • 2267 Words
    • 10 Pages

    . Users have to create their own login account by registering themselves. After filling up the registration form, the users can login to their account by entering username and passport for validation.…

    • 2267 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Voicemail Service

    • 1121 Words
    • 5 Pages

    ▪ Common access (ability to check mail box from any number if you know your password)…

    • 1121 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    11. The use of a Secure VPN connection or secure encryption would greatly help mitigate this situation.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Aadhar Card Case Study

    • 855 Words
    • 4 Pages

    Aadhar card has proven its worth over the years. From a mere utility, it has added a whole new look to services. Taking care of loopholes in deliveries. It has helped reduce the redundancy.…

    • 855 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    HACK ANY FACEBOOK ACCOUNT By this method you can hack any account very easily. 1-Copy All Code written. 2-Open the Profile That You Want To Hack it. 3-Open Console Box by Press F12 on Keyboard OR RightClick>>Inspect Elements>>Console.…

    • 5712 Words
    • 7 Pages
    Powerful Essays