Changing the Owner of a Document.........................................................................................................79
Specifying Access Permissions for Files Stored Using the Scanner Function..........................................79
Specifying User and Access Permissions for Files Stored by a Particular User.......................................83
Specifying Passwords for Stored Files........................................................................................................84
Unlocking Files.............................................................................................................................................85
5. Securing Information Sent over the Network or Stored on Hard Disk
Preventing Information Leakage Due to Unauthorized Transmission...........................................................87
Restricting Destinations................................................................................................................................87
Using S/MIME to Protect E-mail Transmission..............................................................................................89
E-mail Encryption.........................................................................................................................................89
Attaching an Electronic Signature..............................................................................................................91
Protecting the Address Book...........................................................................................................................96
Configuring Address Book Access Permissions.........................................................................................96
Encrypting Data in the Address Book.........................................................................................................97
Encrypting Data on the Hard Disk................................................................................................................100
Enabling the Encryption Settings..............................................................................................................100
Printing the Encryption Key.......................................................................................................................104
Updating the Encryption Key....................................................................................................................105
Canceling Data Encryption......................................................................................................................106
Deleting Data on the Hard Disk....................................................................................................................108
Conditions for Use.....................................................................................................................................108
Auto Erase Memory..................................................................................................................................109
Erase All Memory......................................................................................................................................112
6. Managing Access to the Machine
Preventing Changes to Machine Settings....................................................................................................117
Menu Protect..................................................................................................................................................118
Enabling Menu Protect..............................................................................................................................118
Disabling Menu Protect.............................................................................................................................118
Specifying Menu Protect...........................................................................................................................118
Limiting Available Functions..........................................................................................................................122
Specifying Which Functions are Available.............................................................................................122
Managing Log Files.......................................................................................................................................124
Using Web Image Monitor to Manage Log Files...................................................................................124
3