Gestetner dsm725e Reference Manual

Page of 184
Getting Started
8
1
❖ Preventing Data Leaks Due to Unauthorized Transmission
You can specify in the address book which users are allowed to send files us-
ing the scanner or fax function.
You can also limit the direct entry of destinations to prevent files from being
sent to destinations not registered in the address book.
Reference
For details, see p.71 “Preventing Data Leaks Due to Unauthorized Trans-
mission”.
❖ Protecting Registered Information in the Address Book
You can specify who is allowed to access the data in the address book. You
can prevent the data in the address book being used by unregistered users.
To protect the data from unauthorized reading, you can also encrypt the data
in the address book.
Reference
For details, see p.73 “Protecting the Address Book”.
❖ Managing Log Files
You can improve data security by deleting log files stored in the machine. By
transferring the log files, you can check the history data and identify unautho-
rized access.
Reference
For details, see p.90 “Managing Log Files”.
❖ Overwriting the Data on the Hard Disk
Before disposing of the machine, make sure all data on the hard disk is deleted.
Prevent data leakage by automatically deleting transmitted printer jobs from
memory.
To overwrite the hard disk data, the optional DataOverwiteSecurity unit is re-
quired.
Reference
For details, see p.77 “Overwriting the Data on the Hard Disk”.
D0086951_RussianC45-EN.book  Page 8  Wednesday, May 31, 2006  11:45 AM