Gestetner DSc525 Security Manual page 7

Gestetner dsc525: reference guide
Hide thumbs Also See for DSc525:
Table of Contents

Advertisement

Guarding Against Unauthorized Copying ......................................................... 73
Unauthorized Copy Prevention ................................................................................74
Data Security for Copying ........................................................................................75
Printing Limitations...................................................................................................76
Notice .......................................................................................................................77
Printing a Confidential Document ...................................................................... 80
Choosing a Locked Print file ....................................................................................80
Printing a Locked Print File ......................................................................................81
Deleting Locked Print Files ......................................................................................83
Changing Passwords of Locked Print Files..............................................................84
Unlocking Locked Print Files....................................................................................86
Specifying Access Permission for Stored Files ...............................................87
Assigning Users and Access Permission for Stored Files .......................................88
Specifying Passwords for the Stored Files...............................................................97
Unlocking Files.........................................................................................................99
Restrictions on Destinations...................................................................................101
Protecting the Address Book ...........................................................................104
Address Book Access Permission .........................................................................104
Encrypting the Data in the Address Book .............................................................. 107
Deleting Data on the Hard Disk ........................................................................ 110
Overwriting the Data on the Hard Disk................................................................... 110
Preventing Modification of Machine Settings .................................................119
Menu Protect ...................................................................................................... 120
Menu Protect..........................................................................................................120
Limiting Available Functions ............................................................................ 124
Specifying Which Functions are Available .............................................................124
Managing Log Files ...........................................................................................126
Specifying Delete All Logs .....................................................................................126
Transfer Log Setting...............................................................................................127
iv

Advertisement

Table of Contents
loading

Table of Contents