Ricoh Aficio MP C3000 Security Guide - Page 7

Preventing Information Leaks, Managing Access to the Machine

Page 7 highlights

3. Preventing Information Leaks Guarding Against Unauthorized Copying 73 Unauthorized Copy Prevention 74 Data Security for Copying 75 Printing Limitations 76 Notice ...77 Printing with Unauthorized Copy Prevention and Data Security for Copying...........77 Printing a Confidential Document 80 Choosing a Locked Print file 80 Printing a Locked Print File 81 Deleting Locked Print Files 83 Changing Passwords of Locked Print Files 84 Unlocking Locked Print Files 86 Specifying Access Permission for Stored Files 87 Assigning Users and Access Permission for Stored Files 88 Specifying Access Privileges for Files Stored using the Scanner and Fax Functions...91 Assigning the User and the Access Permission for the User's Stored Files 94 Specifying Passwords for the Stored Files 97 Unlocking Files...99 Preventing Data Leaks Due to Unauthorized Transmission 101 Restrictions on Destinations 101 Protecting the Address Book 104 Address Book Access Permission 104 Encrypting the Data in the Address Book 107 Deleting Data on the Hard Disk 110 Overwriting the Data on the Hard Disk 110 4. Managing Access to the Machine Preventing Modification of Machine Settings 119 Menu Protect ...120 Menu Protect...120 Limiting Available Functions 124 Specifying Which Functions are Available 124 Managing Log Files 126 Specifying Delete All Logs 126 Transfer Log Setting 127 iv

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236

iv
3. Preventing Information Leaks
Guarding Against Unauthorized Copying
.........................................................
73
Unauthorized Copy Prevention
................................................................................
74
Data Security for Copying
........................................................................................
75
Printing Limitations
...................................................................................................
76
Notice
.......................................................................................................................
77
Printing with Unauthorized Copy Prevention and Data Security for Copying
...........
77
Printing a Confidential Document
......................................................................
80
Choosing a Locked Print file
....................................................................................
80
Printing a Locked Print File
......................................................................................
81
Deleting Locked Print Files
......................................................................................
83
Changing Passwords of Locked Print Files
..............................................................
84
Unlocking Locked Print Files
....................................................................................
86
Specifying Access Permission for Stored Files
...............................................
87
Assigning Users and Access Permission for Stored Files
.......................................
88
Specifying Access Privileges for Files Stored using the Scanner and Fax Functions
...91
Assigning the User and the Access Permission for the User’s Stored Files
............
94
Specifying Passwords for the Stored Files
...............................................................
97
Unlocking Files
.........................................................................................................
99
Preventing Data Leaks Due to Unauthorized Transmission
..........................
101
Restrictions on Destinations
...................................................................................
101
Protecting the Address Book
...........................................................................
104
Address Book Access Permission
.........................................................................
104
Encrypting the Data in the Address Book
..............................................................
107
Deleting Data on the Hard Disk
........................................................................
110
Overwriting the Data on the Hard Disk
...................................................................
110
4. Managing Access to the Machine
Preventing Modification of Machine Settings
.................................................
119
Menu Protect
......................................................................................................
120
Menu Protect
..........................................................................................................
120
Limiting Available Functions
............................................................................
124
Specifying Which Functions are Available
.............................................................
124
Managing Log Files
...........................................................................................
126
Specifying Delete All Logs
.....................................................................................
126
Transfer Log Setting
...............................................................................................
127