4. Protecting Data from Information Leaks
Preventing Unauthorized Copying.................................................................................................................95
Unauthorized Copy Prevention..................................................................................................................95
Data Security for Copying..........................................................................................................................96
Notice...........................................................................................................................................................97
Specifying Data Security for Copying Using the Control Panel...............................................................
97
Printing a Confidential Document...................................................................................................................99
Specifying Locked Print File.........................................................................................................................99
Printing a Locked Print File........................................................................................................................100
Deleting Locked Print Files........................................................................................................................101
Changing the Password of a Locked Print File........................................................................................102
Unlocking a Locked Print File....................................................................................................................103
Configuring Access Permissions for Stored Files.........................................................................................105
Specifying User and Access Permissions for Stored Files......................................................................106
Changing the Owner of a Document......................................................................................................109
Specifying Access Permissions for Files Stored Using the Scanner and Fax Functions.......................109
Specifying User and Access Permissions for Files Stored by a Particular User....................................113
Specifying Passwords for Stored Files.....................................................................................................114
Unlocking Files...........................................................................................................................................115
5. Securing Information Sent over the Network or Stored on Hard Disk
Preventing Information Leakage Due to Unauthorized Transmission........................................................117
Restricting Destinations..............................................................................................................................117
Using S/MIME to Protect E-mail Transmission............................................................................................
120
E-mail Encryption.......................................................................................................................................120
Attaching an Electronic Signature............................................................................................................122
Protecting the Address Book.........................................................................................................................129
Configuring Address Book Access Permissions......................................................................................129
Encrypting Data in the Address Book......................................................................................................130
Encrypting Data on the Hard Disk................................................................................................................133
Enabling the Encryption Settings..............................................................................................................133
Printing the Encryption Key.......................................................................................................................137
Updating the Encryption Key....................................................................................................................138
Canceling Data Encryption......................................................................................................................139
3