Preview

Getting Started With Employee Self Service

Satisfactory Essays
Open Document
Open Document
383 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Getting Started With Employee Self Service
Getting Started With Employee Self Service
New Roundy’s Computer System Users
If you have not previously logged into a Roundy’s computer system you must create a new password prior to using the OneRoundy’s Employee Self Service system. Click on “Manage My Password” at the top of the OneRoundy’s
Portal Page. Follow the instructions in the “Password Management” section starting on the next page of this document to create your password.
Current Roundy’s Computer System Users
Use your current user ID and password.

Congratulations! You are now ready to use the OneRoundy’s Employee Self Service system.

6/17/2013

Password Management
Roundy’s Password and Account Management Portal allows you to manage the passwords you use for Roundy’s computer systems. Click on “Manage My Password” at the top of the OneRoundy’s Employee Self Service Portal Page to go to begin.

First-Time Roundy’s System Users
If you have not previously logged into a Roundy’s computer system, you are required to create a password prior to using Employee Self Service for the first time. Please perform the following steps.
Existing Roundy’s computer system users do not need to perform these steps.

1. Enter your 6-digit Employee ID.

6/17/2013

2. Select the first option by clicking in the circle to the left of the text “By providing answers to my secret questions”. 3. Enter in the last 4 digits of your Social Security Number.
4. Click the “Submit” button.
6/17/2013

5. You will now need to answer an additional security question. Click the “Close” button.

6. Enter the answer to the additional security question twice.
7. Click the “Submit” button.

6/17/2013

8. Click the check box to the left of “Group: Default”.
9. Enter a new password. Consider a new password that you will remember and enter it in both boxes.
Rules for password:
 Cannot be shorter than 7 characters
 Cannot be larger than 100 characters
 Requires a minimum of 1 letter
 Cannot use first name, last name or userID
 Requires a

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 5 Study Guide

    • 603 Words
    • 3 Pages

    Login as Mikexxx with his assigned password (you need to know how to login as a new user).…

    • 603 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    One of the reasons why we have User account maintenance is for security by making sure the user account have a force password change when first logging in to the account to make sure the user have a one of a kind…

    • 935 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Don’t share or divulge your passwords to anyone. It is risky. Evil minded people could gain access to your accounts with such passwords. Remember that you would be held responsible for anything done through your accounts.…

    • 599 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Com Data

    • 398 Words
    • 2 Pages

    AUTH. CHECK FP=JUST VERIFY THE AMOUNT AND PRESS F2, PAG NAKITA K NA NO AUTH. FP JUST PRESS F2…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The implementation of McBride's new electronic key cards provides an excellent source of control in the area of physical security. Employees will now only have access to areas that they are authorized to there specific authorization level. Any unauthorized access to any area of any McBride facility will be punishable in accordance with McBride's Non-Compliance Policy. A service charge may be assessed for access cards and/or keys that are lost, stolen, or are not returned. (The Trusted Toolkit, 2007) Lost cards will also be immediately deactivated at the release of a new card. Card access records and visitor logs must also be kept current for routine review based upon the needs of the company.…

    • 897 Words
    • 4 Pages
    Better Essays
  • Good Essays

    “On the Rainy River” by Tim O’Brien is the best short story in the collection because of its’ great character development, plot, and theme. This story is about how the author dealt with himself and his frustrations before heading off to the Vietnam War.…

    • 542 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Password Protection

    • 4064 Words
    • 17 Pages

    * First and foremost, NEVER give your password to anyone. ``Anyone'' means your coworkers, your spouse, your systems administrator. In the event of an emergency, the sysadmin can change your password. Your sytems administrator never has a need to know your personal password. If someone needs to get onto our machines, and has a reason to be here, do not give them access to your account. Speak to the systems staff about us setting up an account for them. We would be very happy to give them one.…

    • 4064 Words
    • 17 Pages
    Good Essays
  • Good Essays

    Harding Cisco Router

    • 675 Words
    • 3 Pages

    Routers are the basic level of the Internet. It is responsible for the communication through the network, between computers and servers. It is important to secure the routers so the attackers can’t gain information from the routers. There are many ways of securing the routers such as upgrade the operating system, warning banners and disable unneeded services.…

    • 675 Words
    • 3 Pages
    Good Essays
  • Good Essays

    · If you cannot change the security settings on a work computer try accessing the service at home or on another…

    • 400 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    could be accessed by the unauthorized user for malicious purpose. Therefore, it is necessary to apply…

    • 3115 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Voicemail Service

    • 1121 Words
    • 5 Pages

    ▪ Common access (ability to check mail box from any number if you know your password)…

    • 1121 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Aadhar Card Case Study

    • 855 Words
    • 4 Pages

    Aadhar card has proven its worth over the years. From a mere utility, it has added a whole new look to services. Taking care of loopholes in deliveries. It has helped reduce the redundancy.…

    • 855 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Remote Access

    • 496 Words
    • 2 Pages

    This two part authentication process would be added to every access point either remotely or locally by any and all employees within Richman Investments. I’ve had to use this device in several of my customer service positions because there was always sensitive information that I didn’t need to see and if there was nothing in place to prevent me…

    • 496 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    HACK ANY FACEBOOK ACCOUNT By this method you can hack any account very easily. 1-Copy All Code written. 2-Open the Profile That You Want To Hack it. 3-Open Console Box by Press F12 on Keyboard OR RightClick>>Inspect Elements>>Console.…

    • 5712 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    11. The use of a Secure VPN connection or secure encryption would greatly help mitigate this situation.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays