Konica Minolta bizhub C280 Product Guide - Page 176

Copy Guard, Password Copy, Authentication For User Box Access, Limiting Access To Destinations

Page 176 highlights

bizhub C360/C280/C220 Security COPY GUARD* The Copy Guard feature detects the predetermined background pattern on the unauthorized copy and completely prohibits copying. PASSWORD COPY* Although the predetermined background pattern on the unauthorized copy is detected, copies are allowed via a password. *Requires an optional Security Kit SC-507 AUTHENTICATION FOR USER BOX ACCESS The correct four-digit password must be entered to access data in a User Box. The password must also be entered on the control panel to send data stored in a private User Box by Email or FTP directly from the C360/C280/C220. The Administrator Password must be entered to back up data from a User Box onto a PC or to restore data in a User Box from a PC.* *HDD Backup Utility is required. LIMITING ACCESS TO DESTINATIONS Limits can be placed on the destinations that appear for each user that is accessing them. This function allows a group and level to be specified for the address book destination and settings to be specified for applying limits to registered destinations. An access permission level can be specified for each user and destination. The destinations that can be accessed by users can be limited according to the access permission levels specified for the user and destination. 172

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

bizhub C360
/
C280
/
C220
Security
172
COPY GUARD*
The Copy Guard feature detects the predetermined background pattern
on the unauthorized copy and completely prohibits copying.
PASSWORD COPY*
Although the predetermined background pattern on the unauthorized copy
is detected, copies are allowed via a password.
*Requires an optional Security Kit SC-507
AUTHENTICATION FOR USER BOX ACCESS
The correct four-digit password must be entered to access data in a User Box.
The password must also be entered on the control panel to send data stored
in a private User Box by Email or FTP directly from the C360/C280/C220.
The Administrator Password must be entered to back up data from a User Box
onto a PC or to restore data in a User Box from a PC.*
*HDD Backup Utility is required.
LIMITING ACCESS TO DESTINATIONS
Limits can be placed on the destinations that appear for each user that
is accessing them. This function allows a group and level to be specified
for the address book destination and settings to be specified for applying
limits to registered destinations.
An access permission level can be specified for each user and destination.
The destinations that can be accessed by users can be limited according
to the access permission levels specified for the user and destination.