1 / 8

E-Filing Technical Aspects

E-Filing Technical Aspects. To Access IRD Online Services you need PC with A web browser Internet Access User id and password No software is required. Web Browsers IRD recommended Firefox 3.0 and over Internet Explorer 7 The system was tested with Firefox 2 Google’s Chrome.

ray
Download Presentation

E-Filing Technical Aspects

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. E-Filing Technical Aspects

  2. To Access IRD Online Services you need • PC with • A web browser • Internet Access • User id and password • No software is required

  3. Web Browsers • IRD recommended • Firefox 3.0 and over • Internet Explorer 7 • The system was tested with • Firefox 2 • Google’s Chrome

  4. Web Browsers • Apple’s Safari (Mac and IPhones) • Internet Explorer 6.5 • Printing • To print documents from the system you will need a PDF (Portable Document Format) reader such as Adobe Reader

  5. What PC specifications are required? • Any PC that is able to handle those browsers will run the application • JavaScript should be allowed • Cookies should be allowed • Bandwidth • 128k for individuals and small business but large employers and other third party providers will require large bandwidth.

  6. What are the specifications of the PC? • Screen resolution is important • The higher the better • 1024 x 768 pixels and over should be OK. Resolutions below that will require a lot of scrolling.

  7. Security Software and hardware solutions will be deployed to protect you information • Firewalls • Intrusion prevention hardware and software • Denial of service attacks

  8. End of Presentation Thank You

More Related