Restricting the Use of the Machine
This chapter describes how to protect the machine from unauthorized access. Some of these
features also enable you to keep track of fax transactions based on division numbers or user
access codes that you can assign to individuals or sections inside your company.
Using Memory Lock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-17
Turning Memory Lock ON . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-20
Setting a PIN Code. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-22
Forced PIN Code Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-31
CF-PL Reference Guide_USEN HT1-2187-000-V.1.0
4
CHAPTER
4-1