Gestetner dsc525 Guide De Référence

Page de 236
iv
3. Preventing Information Leaks
Guarding Against Unauthorized Copying ......................................................... 73
Unauthorized Copy Prevention ................................................................................74
Data Security for Copying ........................................................................................75
Printing Limitations................................................................................................... 76
Notice .......................................................................................................................77
Printing with Unauthorized Copy Prevention and Data Security for Copying........... 77
Printing a Confidential Document ...................................................................... 80
Choosing a Locked Print file .................................................................................... 80
Printing a Locked Print File ...................................................................................... 81
Deleting Locked Print Files ...................................................................................... 83
Changing Passwords of Locked Print Files..............................................................84
Unlocking Locked Print Files.................................................................................... 86
Specifying Access Permission for Stored Files ............................................... 87
Assigning Users and Access Permission for Stored Files ....................................... 88
Specifying Access Privileges for Files Stored using the Scanner and Fax Functions...91
Assigning the User and the Access Permission for the User’s Stored Files ............ 94
Specifying Passwords for the Stored Files...............................................................97
Unlocking Files.........................................................................................................99
Preventing Data Leaks Due to Unauthorized Transmission.......................... 101
Restrictions on Destinations................................................................................... 101
Protecting the Address Book ........................................................................... 104
Address Book Access Permission ......................................................................... 104
Encrypting the Data in the Address Book .............................................................. 107
Deleting Data on the Hard Disk ........................................................................ 110
Overwriting the Data on the Hard Disk................................................................... 110
4. Managing Access to the Machine
Preventing Modification of Machine Settings ................................................. 119
Menu Protect ...................................................................................................... 120
Menu Protect.......................................................................................................... 120
Limiting Available Functions ............................................................................ 124
Specifying Which Functions are Available ............................................................. 124
Managing Log Files ........................................................................................... 126
Specifying Delete All Logs ..................................................................................... 126
Transfer Log Setting............................................................................................... 127
AthenaC1_Sec_F7-EN_FM_forPaper.book  Page iv  Monday, March 20, 2006  3:07 PM