Aficio C6055 Operating Instructions Manual page 7

Security reference
Table of Contents

Advertisement

Changing Passwords of Locked Print Files..............................................................................................112
Unlocking Locked Print Files.....................................................................................................................114
Specifying Access Permission for Stored Files.............................................................................................116
Assigning Users and Access Permission for Stored Files........................................................................116
Specifying Passwords for Stored Files.....................................................................................................126
Unlocking Files...........................................................................................................................................127
Preventing Data Leaks Due to Unauthorized Transmission........................................................................130
Restrictions on Destinations.......................................................................................................................130
Using S/MIME to Protect Email Transmission.............................................................................................133
Email Encryption........................................................................................................................................133
Attaching an Electronic Signature............................................................................................................135
Protecting the Address Book.........................................................................................................................141
Address Book Access Permission.............................................................................................................141
Encrypting Data in the Address Book......................................................................................................144
Encrypting Data on the Hard Disk................................................................................................................147
Enabling the Encryption Settings..............................................................................................................147
Printing the Encryption Key.......................................................................................................................150
Updating the Encryption Key....................................................................................................................152
Canceling Data Encryption......................................................................................................................154
Deleting Data on the Hard Disk....................................................................................................................157
Overwriting Data on the Hard Disk.........................................................................................................157
Preventing Modification of Machine Settings..............................................................................................167
Menu Protect..................................................................................................................................................169
Menu Protect..............................................................................................................................................169
Limiting Available Functions..........................................................................................................................174
Specifying Which Functions are Available.............................................................................................174
Managing Log Files.......................................................................................................................................177
Specifying Delete All Logs........................................................................................................................177
Transfer Log Setting...................................................................................................................................178
5

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ld260cLd275cC7570Mp c6000Mp c7500

Table of Contents