Getting Started; Enhanced Security - Gestetner DSc525 Security Manual

Gestetner dsc525: reference guide
Hide thumbs Also See for DSc525:
Table of Contents

Advertisement

Enhanced Security

This machine's security function can be enhanced through the management of
the machine and its users using the improved authentication functions.
By specifying access limits on the machine's functions and the documents and
data stored in the machine, you can prevent information leaks and unauthorized
access.
Data encryption can prevent unauthorized data access and tampering via the
network.
❖ Authentication and Access Limits
Using authentication, administrators manage the machine and its users. To
enable authentication, information about both administrators and users must
be registered in order to authenticate users via their login user names and
passwords.
Four types of administrator manage specific areas of machine usage, such as
settings and user registration.
Access limits for each user are specified by the administrator responsible for
user access to machine functions and documents and data stored in the ma-
chine.
Reference
For details, see p.11 "Administrators".
❖ Encryption Technology
This machine can establish secure communication paths by encrypting trans-
mitted data and passwords.

1. Getting Started

3

Advertisement

Table of Contents
loading

Table of Contents