Security Measures Provided By This Machine; Using Authentication And Managing Users; Ensuring Information Security - Ricoh PRO C900 Operating Instructions Manual

Security reference
Hide thumbs Also See for PRO C900:
Table of Contents

Advertisement

1. Getting Started

Security Measures Provided by this Machine

1

Using Authentication and Managing Users

Enabling Authentication
To control administrators' and users' access to the machine, perform administrator authentication and
user authentication using login user names and login passwords. To perform authentication, the
authentication function must be enabled. For details about authentication settings, see "Enabling
Authentication".
Specifying Which Functions are Available
This can be specified by the user administrator. Specify the functions available to registered users. By
making this setting, you can limit the functions available to users. For information on how to specify
which functions are available, see "Limiting Available Functions".
• p.22 "Enabling Authentication"
• p.92 "Limiting Available Functions"

Ensuring Information Security

Protecting Registered Information in the Address Book
You can specify who is allowed to access the data in the address book. You can prevent the data in
the address book being used by unregistered users.
To protect the data from unauthorized reading, you can also encrypt the data in the address book.
For details about protecting registered information in the address book, see "Protecting the Address
Book".
Overwriting the Data on the Hard Disk
Before disposing of the machine, make sure all data on the hard disk is deleted. Prevent data leakage
by automatically deleting transmitted printer jobs from the memory.
To overwrite the hard disk data, the optional DataOverwriteSecurity Unit is required. For details about
overwriting the data on the hard disk, see "Deleting Data on the Hard Disk".
• p.77 "Protecting the Address Book"
• p.84 "Deleting Data on the Hard Disk"
14

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents