10. Press [Exit].
11. Select the user to whom you want to assign access permission, and then select the
permission.
Select the permission, from [Read-only], [Edit], [Edit / Delete], or [Full Control].
12. Press [Exit].
13. Press [OK].
14. Press [Exit].
15. Press the [User Tools/Counter] key.
• The "Edit", "Edit / Delete", and "Full Control" access permissions allow a user to perform high level
operations that could result in loss of or changes to sensitive information. We recommend you grant
only the "Read-only" permission to general users.
• p.33 "Logging in Using Administrator Authentication"
• p.34 "Logging out Using Administrator Authentication"
Encrypting Data in the Address Book
This can be specified by the user administrator.
You can
encrypt the data in the Address Book using the extended security function, "Encrypt Address Book".
For details about this and other extended security functions, see "Specifying the Extended Security
Functions".
For details about logging in and logging out with administrator authentication, see "Logging in Using
Administrator Authentication" and "Logging out Using Administrator Authentication".
1. Press the [User Tools/Counter] key.
2. Press [System Settings].
3. Press [Administrator Tools].
4. Press [Extended Security].
If this item is not visible, press [
Next] to display more settings.
5. Securing Information Sent over the Network or Stored on Hard Disk
118