Restricting the Use of the
Machine
This chapter describes how to protect the machine from unauthorized access. Some of these
features also enable you to keep track of fax transactions and copy (printing) based on division
numbers that you can assign to individuals or sections inside your company. You can also set the
machine to receive and store all documents in memory using Memory Lock feature.
Using Memory Lock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-17
Turning Memory Lock ON . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-20
4
CHAPTER
4-1