EasyManuals Logo

Oki C830 Security Guide

Oki C830
23 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #5 background imageLoading...
Page #5 background image
Document security > 5
D
OCUMENT
SECURITY
Document security can be breached in many ways. Some are obvious and can be remedied
quite easily;
> Unattended documents left in a printer’s output tray. Even one connected “one-to-
one” with a computer.
> Worse still, unattended documents left in a networked printer’s output tray, for all to
see!
> Personnel possessing confidential documents off-site.
Other security risks may not be so obvious.
As printers and multi-function products become more sophisticated so must the security
measures to ensure your valuable data is kept secure.
If left unprotected, access to records can be achieved via a networked machine. On-board
storage devices may contain confidential data such as PIN numbers, personnel names and
IP addresses as well as raw text.
Your machine has a number of valuable features which, when enabled, reduce the risk of
security breaches.
The following chapters guide you through the initial set up and also explain how you use
the secure printing features.
G
LOSSARY
IP Internet Protocol
MAC Address Media Access Control Address
PIN Personal Identification Number
SSL Secure Sockets Layer
TLS Transport Layer Security
Storage device Hard disk drive (HDD) or SD card

Other manuals for Oki C830

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Oki C830 and is the answer not in the manual?

Oki C830 Specifications

General IconGeneral
BrandOki
ModelC830
CategoryAll in One Printer
LanguageEnglish

Related product manuals