Preventing Data Leaks Due to
Unauthorized Transmission
If user authentication is specified, the user who has logged on can be designated
as the sender to prevent unauthorized access.
You can also limit the direct entry of destinations to prevent files from being sent
to destinations not registered in the address book.
Restrictions on Destinations
This can be specified by the user administrator.
Make the setting to disable the direct entry of e-mail addresses and phone num-
bers under the scanner and fax functions.
By making this setting, the destinations can be restricted to addresses registered
in the address book.
Preparation
For details about logging on with administrator authentication, see p.81
"Logging on Using Administrator Authentication".
For details about logging off with administrator authentication, see p.82
"Logging off Using Administrator Authentication".
A A A A
Press the { { { { User Tools/Counter} } } } key.
B B B B
Press [System Settings].
C C C C
Press [Administrator Tools].
D D D D
Press [Extended Security].
Preventing Data Leaks Due to Unauthorized Transmission
2
19