Ricoh 917F Operating Instructions Manual page 1338

All in one printer
Table of Contents

Advertisement

Using S/MIME to Protect E-mail Transmission
When sending mail from the scanner to a user registered in the Address Book, you can use S/MIME
to protect its contents from interception and alteration, and attach an electronic signature to guarantee
the sender's identity. For details about using S/MIME to protect e-mail transmission, see "Using S/
MIME to Protect E-mail Transmission".
Protecting Registered Information in the Address Book
You can specify who is allowed to access the data in the Address Book. You can prevent the data in
the Address Book being used by unregistered users.
To protect the data from unauthorized reading, you can also encrypt the data in the Address Book.
For details about protecting registered information in the Address Book, see "Protecting the Address
Book".
Managing Log Files
The logs record failed access attempts and the names of users who accessed the machine successfully.
You can use this information to help prevent data leaks.
To transfer the log data, Web SmartDeviceMonitor is required. For details about managing log files,
see "Managing Log Files".
Encrypting Data on the Hard Disk
Encrypt data stored on the hard disk to prevent information leakage. The HDD Encryption Unit is
required for hard disk data encryption. For details, see "Encrypting Data on the Hard Disk".
Overwriting the Data on the Hard Disk
To prevent data leaks, you can set the machine to automatically overwrite temporary data. We
recommend that before disposing of the machine, you overwrite all the data on the hard disk. To
overwrite the hard disk data, the optional DataOverwriteSecurity Unit is required. For details about
overwriting the data on the hard disk, see "Deleting Data on the Hard Disk".
• p.99 "Printing a Confidential Document"
• p.107 "Preventing Information Leakage Due to Unauthorized Transmission"
• p.110 "Using S/MIME to Protect E-mail Transmission"
• p.118 "Protecting the Address Book"
• p.150 "Managing Log Files"
• p.124 "Encrypting Data on the Hard Disk"
• p.132 "Deleting Data on the Hard Disk"
Security Measures Provided by this Machine
1
19

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents