Справочник для Gestetner dsm725e

Скачать
Страница из 184
Protecting the Address Book
73
3
Protecting the Address Book
If user authentication is specified, the user who has logged on will be designated
as the sender to prevent data from being sent by an unauthorized person mas-
querading as the user.
To protect the data from unauthorized reading, you can also encrypt the data in
the address book.
Address Book Access Permission 
This can be specified by the registered user. The access permission can also be
specified by a user granted full control or the user administrator.
You can specify who is allowed to access the data in the address book.
By making this setting, you can prevent the data in the address book being used
by unregistered users.
Preparation
For details about logging on and logging off with administrator authentica-
tion, see p.21 “Logging on Using Administrator Authentication”, p.22 “Log-
ging off Using Administrator Authentication”.
A
Press the {User Tools/Counter} key.
B
Press [System Settings].
C
Press [Administrator Tools].
D
Press [Address Book Management].
If the setting to be specified does not appear, press [TNext] to scroll down to
other settings.
D0086951_RussianC45-EN.book  Page 73  Wednesday, May 31, 2006  11:45 AM