Limiting And Controlling Access - Ricoh Pro C651EX Operating Instructions Manual

Hide thumbs Also See for Pro C651EX:
Table of Contents

Advertisement

1. Getting Started
Using S/MIME to Protect E-mail Transmission
When sending mail from the scanner to a user registered in the Address Book, you can use S/MIME
to protect its contents from interception and alteration, and attach an electronic signature to guarantee
1
the sender's identity. For details about using S/MIME to protect e-mail transmission, see p.89 "Using
S/MIME to Protect E-mail Transmission".
Protecting Registered Information in the Address Book
You can specify who is allowed to access the data in the Address Book. You can prevent the data in
the Address Book from being used by unregistered users.
To protect the data from unauthorized reading, you can also encrypt the data in the Address Book.
For details about protecting registered information in the Address Book, see p.96 "Protecting the
Address Book".
Managing Log Files
The logs record failed access attempts and the names of users who accessed the machine successfully.
You can use this information to help prevent data leaks. For details about managing log files, see
p.124 "Managing Log Files".
Encrypting Data on the Hard Disk
Encrypt data stored on the hard disk to prevent information leakage. For details, see p.100
"Encrypting Data on the Hard Disk".
Overwriting the Data on the Hard Disk
To prevent data leaks, you can set the machine to automatically overwrite temporary data. We
recommend that before disposing of the machine, you overwrite all the data on the hard disk. For
details about overwriting the data on the hard disk, see p.108 "Deleting Data on the Hard Disk".

Limiting and Controlling Access

Preventing Modification or Deletion of Stored Data
You can allow selected users to access stored scan files and files stored in the Document Server.
You can permit selected users who are allowed to access stored files to modify or delete the files. For
details about limiting and controlling access, see p.75 "Configuring Access Permissions for Stored
Files".
Preventing Modification of Machine Settings
The machine settings that can be modified depend on the type of administrator account.
Register the administrators so that users cannot change the administrator settings. For details about
preventing modification of machine settings, see p.117 "Preventing Changes to Machine Settings".
20

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pro c751ex

Table of Contents