Ricoh Aficio SP C811DN Software Guide - Page 350

Preventing Information Leaks

Page 350 highlights

10. Security Measures Provided by this Printer Preventing Information Leaks Guarding Against Unauthorized Copying (Unauthorized Copy Prevention) Using the printer driver, mask and pattern can be embedded in the printed document. Guarding Against Unauthorized Copying (Data security for copying) Using the printer driver with the data security for the copying function, a document can be printed with an embedded pattern of hidden text. To gray out the copy or stored file of a copy-guarded document when the document is copied or stored , the optional security module is required. Printing confidential files Using the printer's Locked Print, files can be stored in the printer as confidential files and then print them. Those file can be printed using the printer's control panel and collected on the spot to prevent others from seeing it. Preventing Data Leaks Due to Unauthorized Transmission You can specify in the address book which users are allowed to send files using the scanner or fax function. You can also limit the direct entry of destinations to prevent files from being sent to destinations not registered in the address book. Protecting Registered Information in the Address Book This function allows administrator to specify which users have permission to access the data in the address book. Usage of the data in the address book by unregistered users can be prevented. Administrator can also encrypt the data in the address book to protect the data from unauthorized reading. Managing Log Files 10 Data security can by improved by deleting log files stored in the printer. By transferring the log files, administrator can check the history data and identify unauthorized access. To transfer the log data, the log collection server is required. Overwriting the Data on the Hard Disk Before disposing of the printer, make sure all data on the hard disk is deleted. Prevent data leakage by automatically deleting transmitted printer jobs from memory. To overwrite the hard disk data, the optional ipp unit is required. 348

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384

Preventing Information Leaks
Guarding Against Unauthorized Copying (Unauthorized Copy Prevention)
Using the printer driver, mask and pattern can be embedded in the printed document.
Guarding Against Unauthorized Copying (Data security for copying)
Using the printer driver with the data security for the copying function, a document can be printed
with an embedded pattern of hidden text.
To gray out the copy or stored file of a copy-guarded document when the document is copied or
stored , the optional security module is required.
Printing confidential files
Using the printer's Locked Print, files can be stored in the printer as confidential files and then print
them. Those file can be printed using the printer's control panel and collected on the spot to prevent
others from seeing it.
Preventing Data Leaks Due to Unauthorized Transmission
You can specify in the address book which users are allowed to send files using the scanner or fax
function.
You can also limit the direct entry of destinations to prevent files from being sent to destinations not
registered in the address book.
Protecting Registered Information in the Address Book
This function allows administrator to specify which users have permission to access the data in the
address book. Usage of the data in the address book by unregistered users can be prevented.
Administrator can also encrypt the data in the address book to protect the data from unauthorized
reading.
Managing Log Files
Data security can by improved by deleting log files stored in the printer. By transferring the log files,
administrator can check the history data and identify unauthorized access.
To transfer the log data, the log collection server is required.
Overwriting the Data on the Hard Disk
Before disposing of the printer, make sure all data on the hard disk is deleted. Prevent data leakage
by automatically deleting transmitted printer jobs from memory.
To overwrite the hard disk data, the optional ipp unit is required.
10. Security Measures Provided by this Printer
348
10