Aficio C6055 Operating Instructions Manual page 18

Security reference
Table of Contents

Advertisement

1. Getting Started
Printing confidential files
Using the printer's Locked Print, you can store files in the machine as confidential files and then print
them. You can print a file using the machine's control panel and collect it on the spot to prevent others
1
from seeing it. For details about printing confidential files, see "Printing a Confidential Document".
Protecting Stored Files from Unauthorized Access
You can specify who is allowed to use and access scanned files and the files in Document Server.
You can prevent activities such as the printing of stored files by unauthorized users. For details about
protecting stored files from unauthorized access, see "Specifying Access Permission for Stored Files".
Protecting Stored Files from Theft
You can specify who is allowed to use and access scanned files and the files in Document Server.
You can prevent activities such as the sending and downloading of stored files by unauthorized users.
For details about protecting stored files from theft, see "Specifying Access Permission for Stored Files".
Preventing Data Leaks Due to Unauthorized Transmission
You can specify in the Address Book which users are allowed to send files using the scanner or fax
function.
You can also limit the direct entry of destinations to prevent files from being sent to destinations not
registered in the Address Book. For details about preventing data leaks due to unauthorized
transmission, see "Preventing Data Leaks Due to Unauthorized Transmission".
Using S/MIME to Protect Email Transmission
When sending mail from the scanner or forwarding a fax to a user registered in the Address Book,
you can use S/MIME to protect its contents from interception and alteration, and attach an electronic
signature to guarantee the sender's identity. For details about using S/MIME to protect e-mail
transmission, see "Using S/MIME to Protect Email Transmission".
Protecting Registered Information in the Address Book
You can specify who is allowed to access the data in the Address Book. You can prevent the data in
the Address Book being used by unregistered users.
To protect the data from unauthorized reading, you can also encrypt the data in the Address Book.
For details about protecting registered information in the Address Book, see "Protecting the Address
Book".
Managing Log Files
You can improve data security by deleting log files stored in the machine. By transferring the log files,
you can check the history data and identify unauthorized access.
To transfer the log data, Web SmartDeviceMonitor Professional IS/Standard is required. For details
about managing log files, see "Managing Log Files".
Encrypting Data on the Hard Disk
Encrypt data stored on the hard disk to prevent information leakage. The HDD Encryption Unit is
required for hard disk data encryption. For details about encrypting data on the hard disk, see
"Encrypting Data on the Hard Disk".
16

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ld260cLd275cC7570Mp c6000Mp c7500

Table of Contents