Ricoh Aficio GX3000 User Guide - Page 193

Unauthorized Copy Control

Page 193 highlights

Printing 2. Click [Add/Change Custom Settings...], and click [Save as Overlay Data...] in the [Job type:] list. If the dialog box type is Multi-tab, click [Save as Overlay Data...] in the [Job type:] list. 3. Select the overlay image file you want to delete. 4. Click [Delete]. A confirmation message appears. 5. Click [OK]. The overlay image file is deleted. z You can also delete overlay image files (extension .rpo) using Windows Explorer. z p.151 "Two Types of Printer Properties Dialog Box" z p.153 "Opening from an Application" Creating a New Overlay Set Follow the procedure below to combine an overlay image file and setting details (such as how and which page an overlay image is superimposed on), name it, and register it as a set. Each set registered is called an overlay set. For printing the same overlay image with different setting details, set different combinations of setting details for the same overlay image file, and then register each set as a different overlay set. 1. Open the printer properties dialog box. 2. Click [Add/Change Custom Settings...], and click [Edit] tab. If the dialog box type is Multi-tab, click [Edit] tab. 3. Select the [Watermarks/Overlay:] check box. 4. Click [Add Overlay....]. 5. In the [Add Overlay] dialog box, make the necessary settings, and then click [OK]. The overlay set is registered and added to the list. z p.151 "Two Types of Printer Properties Dialog Box" z p.153 "Opening from an Application" Unauthorized Copy Control To prevent unauthorized copying, you can embed patterns and text beneath the print. You do not need a special paper to use this function. If a paper with text or image patterns is copied by a copier or a multi-function printer, either the patterns are printed vividly or the copy is grayed out, so as to protect the information on the original from leaking. To print with protection against unauthorized copying, you can use [Data security for copying] and [Mask type:]. z This function is designed to discourage copying confidential documents; it does not prevent unauthorized use of information. 193

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249

193
Printing
2.
Click [Add/Change Custom Settings...], and click [Save as Overlay Data...] in the [Job type:] list.
If the dialog box type is Multi-tab, click [Save as Overlay Data...] in the [Job type:] list.
3.
Select the overlay image file you want to delete.
4.
Click [Delete].
A confirmation message appears.
5.
Click [OK].
The overlay image file is deleted.
You can also delete overlay image files (extension .rpo) using Windows Explorer.
p.151 "
Two Types of Printer Properties Dialog Box
"
p.153 "
Opening from an Application
"
Creating a New Overlay Set
Follow the procedure below to combine an overlay image file and setting details (such as how and which page
an overlay image is superimposed on), name it, and register it as a set. Each set registered is called an overlay
set.
For printing the same overlay image with different setting details, set different combinations of setting details for
the same overlay image file, and then register each set as a different overlay set.
1.
Open the printer properties dialog box.
2.
Click [Add/Change Custom Settings...], and click [Edit] tab.
If the dialog box type is Multi-tab, click [Edit] tab.
3.
Select the [Watermarks/Overlay:] check box.
4.
Click [Add Overlay
....
].
5.
In the [Add Overlay] dialog box, make the necessary settings, and then click [OK].
The overlay set is registered and added to the list.
p.151 "
Two Types of Printer Properties Dialog Box
"
p.153 "
Opening from an Application
"
Unauthorized Copy Control
To prevent unauthorized copying, you can embed patterns and text beneath the print. You do not need a special
paper to use this function. If a paper with text or image patterns is copied by a copier or a multi-function printer,
either the patterns are printed vividly or the copy is grayed out, so as to protect the information on the original
from leaking. To print with protection against unauthorized copying, you can use [Data security for copying] and
[Mask type:].
This function is designed to discourage copying confidential documents; it does not prevent unauthorized use of information.