Printing a Locked Print File...........................................................................................................................90
Deleting Locked Print Files...........................................................................................................................91
Changing the Password of a Locked Print File...........................................................................................92
Unlocking a Locked Print File......................................................................................................................93
Configuring Access Permissions for Stored Files............................................................................................95
Specifying User and Access Permissions for Stored Files.........................................................................96
Changing the Owner of a Document.........................................................................................................99
Specifying Access Permissions for Files Stored Using the Scanner Function..........................................99
Specifying User and Access Permissions for Files Stored by a Particular User....................................103
Specifying Passwords for Stored Files.....................................................................................................104
Unlocking Files...........................................................................................................................................105
5. Securing Information Sent over the Network or Stored on Hard Disk
Preventing Information Leakage Due to Unauthorized Transmission........................................................107
Restricting Destinations..............................................................................................................................107
Using S/MIME to Protect E-mail Transmission............................................................................................109
E-mail Encryption.......................................................................................................................................109
Attaching an Electronic Signature............................................................................................................111
Protecting the Address Book.........................................................................................................................117
Configuring Address Book Access Permissions......................................................................................117
Encrypting Data in the Address Book......................................................................................................118
Encrypting Data on the Hard Disk................................................................................................................121
Enabling the Encryption Settings..............................................................................................................121
Printing the Encryption Key.......................................................................................................................123
Updating the Encryption Key....................................................................................................................124
Canceling Data Encryption......................................................................................................................126
Deleting Data on the Hard Disk....................................................................................................................127
Conditions for Use.....................................................................................................................................127
Auto Erase Memory..................................................................................................................................128
Erase All Memory......................................................................................................................................132
6. Managing Access to the Machine
Preventing Changes to Machine Settings....................................................................................................137
Menu Protect..................................................................................................................................................139
Enabling Menu Protect..............................................................................................................................139
3