5. Securing Information Sent over the
Network or Stored on Hard Disk
This chapter describes how to protect information transmitted through the network or stored on the hard
disk from unauthorized viewing and modification.
Preventing Information Leakage Due to
Unauthorized Transmission
This section describes Preventing Data Leaks Due to Unauthorized Transmission.
If user authentication is specified, the user who has logged in will be designated as the sender to prevent
data from being sent by an unauthorized person masquerading as the user.
You can also limit the direct entry of destinations to prevent files from being sent to destinations not
registered in the Address Book.
Restricting Destinations
This can be specified by the user administrator.
Make the setting to disable the direct entry of e-mail addresses and phone numbers under the scanner
and fax functions.
By making this setting, the destinations are restricted to addresses registered in the Address Book.
If you set "Restrict Use of Destinations (Fax)" and/or "Restrict Use of Destinations (Scanner)" to [On],
users will not be able to directly enter phone numbers, e-mail addresses, and folder paths as file
destinations on the fax or scanner screen. If you set "Restrict Use of Destinations (Fax)" to [Off], "Restrict
Adding of User Destinations (Fax)" will appear. Similarly, if you set "Restrict Use of Destinations
(Scanner)" to [Off], "Restrict Adding of User Destinations (Scanner)" will appear. Note that selecting
[On] for "Restrict Adding of User Destinations (Fax)" or "Restrict Adding of User Destinations (Scanner)"
will prevent users registering destinations entered using the fax or scanner screen in the Address Book.
If you set "Restrict Adding of User Destinations (Fax)" and/or "Restrict Adding of User Destinations
(Scanner)" to [Off], users will be able to directly enter phone numbers, e-mail addresses, and folder
paths as file destinations using "Prg. Dest." on the fax or scanner screen. If you set these settings to [On],
the [Prg. Dest.] key will not appear. Users will still be able to enter a destination directly using the fax or
scanner screen, but cannot then register that destination in the Address Book by pressing [Prg. Dest.].
Note too that if you set these functions to [On], only the user administrator can register new users in the
Address Book and change the passwords and other information of existing registered users.
"Restrict Use of Destinations (Fax)", "Restrict Use of Destinations (Scanner)", "Restrict Adding of User
Destinations (Fax)" and "Restrict Adding of User Destinations (Scanner)" are extended security functions.
117