Preventing Data Leaks Due To Unauthorized Transmission; Restrictions On Destinations - Aficio C6055 Operating Instructions Manual

Security reference
Table of Contents

Advertisement

3. Ensuring Information Security
Preventing Data Leaks Due to Unauthorized
Transmission
This section describes Preventing Data Leaks Due to Unauthorized Transmission.
If user authentication is specified, the user who has logged on will be designated as the sender to prevent
data from being sent by an unauthorized person masquerading as the user.
You can also limit the direct entry of destinations to prevent files from being sent to destinations not registered
3
in the Address Book.

Restrictions on Destinations

This can be specified by the user administrator.
Make the setting to disable the direct entry of e-mail addresses and phone numbers under the scanner and
fax functions.
By making this setting, the destinations are restricted to addresses registered in the Address Book.
If you set "Restrict Use of Destinations" to [On], you can prohibit users from directly entering telephone
numbers, e-mail addresses, or Folder Path in order to send files. If you set "Restrict Use of Destinations" to
[Off], "Restrict Adding of User Destinations" appears. In "Restrict Adding of User Destinations", you can
restrict users from registering data in the Address Book.
If you set "Restrict Adding of User Destinations" to [Off], users can directly enter destination telephone
numbers, e-mail addresses, and Folder Path in "Program Dest." on the fax and scanner screens. If you set
"Restrict Adding of User Destinations" to [On], users can specify destinations directly, but cannot use
"Program Dest." to register data in the Address Book. When this setting is made, only the user administrator
can change the Address Book.
"Restrict Use of Destinations" and "Restrict Adding of User Destinations" are extended security functions.
For more information about these and other extended security functions, see "Specifying the Extended
Security Functions". "Restrictions on Destinations" can also be specified using Web Image Monitor or
SmartDeviceMonitor for Admin. For details, see the Help for these applications.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
1.
Press the [User Tools/Counter] key.
130

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ld260cLd275cC7570Mp c6000Mp c7500

Table of Contents