EasyManua.ls Logo

Aficio MP 2352 - Page 1792

Aficio MP 2352
2331 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
4. Protecting Data from Information Leaks
Preventing Unauthorized Copying.................................................................................................................95
Unauthorized Copy Prevention..................................................................................................................95
Data Security for Copying..........................................................................................................................96
Notice...........................................................................................................................................................97
Specifying Data Security for Copying Using the Control Panel...............................................................
97
Printing a Confidential Document...................................................................................................................99
Specifying Locked Print File.........................................................................................................................99
Printing a Locked Print File........................................................................................................................100
Deleting Locked Print Files........................................................................................................................101
Changing the Password of a Locked Print File........................................................................................102
Unlocking a Locked Print File....................................................................................................................103
Configuring Access Permissions for Stored Files.........................................................................................105
Specifying User and Access Permissions for Stored Files......................................................................106
Changing the Owner of a Document......................................................................................................109
Specifying Access Permissions for Files Stored Using the Scanner and Fax Functions.......................109
Specifying User and Access Permissions for Files Stored by a Particular User....................................113
Specifying Passwords for Stored Files.....................................................................................................114
Unlocking Files...........................................................................................................................................115
5. Securing Information Sent over the Network or Stored on Hard Disk
Preventing Information Leakage Due to Unauthorized Transmission........................................................117
Restricting Destinations..............................................................................................................................117
Using S/MIME to Protect E-mail Transmission............................................................................................
120
E-mail Encryption.......................................................................................................................................120
Attaching an Electronic Signature............................................................................................................122
Protecting the Address Book.........................................................................................................................129
Configuring Address Book Access Permissions......................................................................................129
Encrypting Data in the Address Book......................................................................................................130
Encrypting Data on the Hard Disk................................................................................................................133
Enabling the Encryption Settings..............................................................................................................133
Printing the Encryption Key.......................................................................................................................137
Updating the Encryption Key....................................................................................................................138
Canceling Data Encryption......................................................................................................................139
3

Table of Contents

Related product manuals