Gestetner dsc525 Guide De Référence

Page de 236
Getting Started
8
1
Reference
For details, see p.73 “Guarding Against Unauthorized Copying”.
❖ Printing confidential files
Using the printer’s Locked Print, you can store files in the machine as confi-
dential files and then print them. You can print a file using the machine’s con-
trol panel and collect it on the spot to prevent others from seeing it.
Reference
For details, see p.80 “Printing a Confidential Document”.
❖ Protecting Stored Files from Unauthorized Access
You can specify who is allowed to use and access scanned files and the files
in Document Server. You can prevent activities such as the printing of stored
files by unauthorized users.
Reference
For details, see p.87 “Specifying Access Permission for Stored Files”.
❖ Protecting Stored Files from Theft
You can specify who is allowed to use and access scanned files and the files
in Document Server. You can prevent such activities as the sending and
downloading of stored files by unauthorized users.
Reference
For details, see p.87 “Specifying Access Permission for Stored Files”.
❖ Preventing Data Leaks Due to Unauthorized Transmission
You can specify in the address book which users are allowed to send files us-
ing the scanner or fax function.
You can also limit the direct entry of destinations to prevent files from being
sent to destinations not registered in the address book.
Reference
For details, see p.101 “Preventing Data Leaks Due to Unauthorized Trans-
mission”.
❖ Protecting Registered Information in the Address Book
You can specify who is allowed to access the data in the address book. You
can prevent the data in the address book being used by unregistered users.
To protect the data from unauthorized reading, you can also encrypt the data
in the address book.
To protect the data from unauthorized reading, you can also encrypt the data
in the address book.
Reference
For details, see p.104 “Protecting the Address Book”.
AthenaC1_Sec_F7-EN_FM_forPaper.book  Page 8  Monday, March 20, 2006  3:07 PM