Canon imageRUNNER ADVANCE C5560i III User Manual page 1393

Hide thumbs Also See for imageRUNNER ADVANCE C5560i III:
Table of Contents

Advertisement

Forced Secure Watermark
You can configure the machine to always embed invisible text such as "CONFIDENTIAL" or "TOP SECRET" in the
background of printed or copied documents. The embedded text becomes visible when the documents are
copied, alerting users to unauthorized duplication or the risk of information leakage.
Text (Forced Secure Watermark)(P. 769)
Forced Document Scan Lock
By configuring the machine to forcibly embed a two-dimensional barcode (Document Scan Lock) in output
documents, you can restrict them from being copied. You can also use an information analysis tool to track
who, when, and which machine was used to embed the two-dimensional barcode.
That Restricts Copying (Forced Document Scan Lock)(P. 771)
Forced Hold
To avoid leaving printed material, accidental information leakage, misprinting, etc., the administrator can set to
store the document before printing.
(P. 479)
Encrypted Secure Print
By using Encrypted Secure Printing, you can send encrypted printing data to a machine from your computer.
This enables you to reduce the risk of information leaks when sending printed data, and to print more safely.
Printing More Safely with Encrypted Secure Print(P. 482)
Digital Signature
You can increase the reliability of documents created on the machine by adding digital signatures to scanned
documents. The digital signature is added using a key and certificate mechanism, which enables you to identify
the device and/or user that created the document, while ensuring that the data has not been altered.
a Digital Signature to Sent Files(P. 778)
Encrypted PDF
Setting a password when scanning an original enables PDF files to be encrypted for sending/saving. This helps
reduce the risk of the files being viewed or edited by others.
Preventing Unauthorized Access to the Network
Firewall Settings
Unauthorized access by third parties, as well as network attacks and breaches, can be blocked by only allowing
communication with devices that have a specific IP address.
Firewalls(P. 728)
Proxy Settings
You can provide greater security by using a proxy server for connections outside the network, such as when
browsing websites.
Implementing Security Measures
Printing Documents Retained in the Machine (Forced Hold Printing)
Although Cloud services have made it easier to exchange data via the
Internet, communication can still be intercepted or modified by malicious
third parties due to network vulnerabilities. The machine provides various
measures for increasing network security, such as only allowing
communication with specific IP addresses and encrypting data for
communication.
Use the following functions as security measures for preventing unauthorized
network access, etc.
Setting a Proxy(P. 737)
Performing Encryption(P. 550)
Restricting Communication by Using
1379
Embedding Invisible
Embedding Information
Adding

Advertisement

Table of Contents
loading

Table of Contents