Table Of Contents; Introduction - Oce im4511 Operating Manual

Data security kit
Hide thumbs Also See for im4511:
Table of Contents

Advertisement

Contents
Introduction ...........................................................................................................................1
When the data security kit is installed ...................................................................................3
G
G
Restrictions on tandem copying and tandem printing......................................................3
G
Security settings in the Web page ...................................................................................4
G
About transfer of copied data to the machine..................................................................4
KEY OPERATOR PROGRAMS............................................................................................5
G
KEY OPERATOR PROGRAM LIST ................................................................................5
G
Using the key operator programs ....................................................................................5
G
SECURITY SETTINGS ...................................................................................................5
G
PRODUCT KEY.............................................................................................................11

Introduction

The ZB3500650 adds a security function to the Imagistics Laser Printer. When the copy
function, printer function, network scanner function, or fax function of a Imagistics Laser
Printer with the security function is used, the image data that is generated for the job is
encrypted, and when the job is finished, the encrypted data is immediately erased from
memory and the hard disk.
Note:
To ensure that the data security function of the data security kit provides maximum security,
please observe the following:
G
The key operator plays an important role in maintaining security. Exercise appropriate care in
selecting the person that will assume the job of key operator for the data security kit.
G
Be sure to change the key operator code immediately each time a new person takes over
as key operator.
G
Change the key operator code on a regular basis (at least once every 60 days).
G
During the procedure for changing the key operator code, the current key operator code
and new key operator code appear in the display. Be sure to complete the procedure
promptly.
G
Do not select a number for the key operator code that can be easily guessed.
G
The key operator programs are very important for security management. If it becomes
necessary to leave the machine during use of the key operator programs, be sure to
press the [CA] key to exit the key operator programs. The administrator of the machine
should inform users that they are not to access the key operator programs without
permission.
G
If the administrator and users of the machine are to be out of the office, security measures
such as locking the machine should be taken to prevent unauthorized access.
G
The customer bears responsibility for control of documents copied and faxes received
using the data security kit.
G
Even when the data security kit is installed, note that fax data in the public memory box
used by the facsimile expansion kit can be read.
1

Advertisement

Table of Contents
loading

This manual is also suitable for:

Im3511Zb3500650

Table of Contents