Ricoh Aficio MP C3000 Security Guide - Page 17
Protecting Registered Information in the Address Book
View all Ricoh Aficio MP C3000 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 17 highlights
Getting Started Reference For details, see p.73 "Guarding Against Unauthorized Copying". ❖ Printing confidential files 1 Using the printer's Locked Print, you can store files in the machine as confi- dential files and then print them. You can print a file using the machine's con- trol panel and collect it on the spot to prevent others from seeing it. Reference For details, see p.80 "Printing a Confidential Document". ❖ Protecting Stored Files from Unauthorized Access You can specify who is allowed to use and access scanned files and the files in Document Server. You can prevent activities such as the printing of stored files by unauthorized users. Reference For details, see p.87 "Specifying Access Permission for Stored Files". ❖ Protecting Stored Files from Theft You can specify who is allowed to use and access scanned files and the files in Document Server. You can prevent such activities as the sending and downloading of stored files by unauthorized users. Reference For details, see p.87 "Specifying Access Permission for Stored Files". ❖ Preventing Data Leaks Due to Unauthorized Transmission You can specify in the address book which users are allowed to send files using the scanner or fax function. You can also limit the direct entry of destinations to prevent files from being sent to destinations not registered in the address book. Reference For details, see p.101 "Preventing Data Leaks Due to Unauthorized Transmission". ❖ Protecting Registered Information in the Address Book You can specify who is allowed to access the data in the address book. You can prevent the data in the address book being used by unregistered users. To protect the data from unauthorized reading, you can also encrypt the data in the address book. To protect the data from unauthorized reading, you can also encrypt the data in the address book. Reference For details, see p.104 "Protecting the Address Book". 8