Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Step 4: After choosing a password you should see that your document is encrypted.

Note

If you are e-mailing or distributing the file, it is recommended to use an alternative form of communication to share the password (e.g. phone call). For example, do not send the password in the same email as the encrypted file.