Limiting And Controlling Access - Ricoh Pro C720s Operating Instructions Manual

Hide thumbs Also See for Pro C720s:
Table of Contents

Advertisement

Preventing Data Leaks Due to Unauthorized Transmission
You can specify in the Address Book which users are allowed to send files using the scanner function.
You can also limit the direct entry of destinations to prevent files from being sent to destinations not
registered in the Address Book. For details about preventing data leaks due to unauthorized
transmission, see "Preventing Data Leaks Due to Unauthorized Transmission".
Using S/MIME to Protect E-mail Transmission
When sending mail from the scanner to a user registered in the Address Book, you can use S/MIME
to protect its contents from interception and alteration, and attach an electronic signature to guarantee
the sender's identity. For details about using S/MIME to protect e-mail transmission, see "Using S/
MIME to Protect Email Transmission".
Protecting Registered Information in the Address Book
You can specify who is allowed to access the data in the address book. You can prevent the data in
the address book being used by unregistered users.
To protect the data from unauthorized reading, you can also encrypt the data in the address book.
For details about protecting registered information in the address book, see "Protecting the Address
Book".
Overwriting the Data on the Hard Disk
To prevent data leaks, you can set the machine to automatically overwrite temporary data. We
recommend that before disposing of the machine, you overwrite all the data on the hard disk.
To overwrite the hard disk data, the optional DataOverwriteSecurity Unit is required. For details about
overwriting the data on the hard disk, see "Deleting Data on the Hard Disk".
• p.83 "Specifying Access Permission for Stored Files"
• p.98 "Preventing Data Leaks Due to Unauthorized Transmission"
• p.101 "Using S/MIME to Protect E-mail Transmission"
• p.109 "Protecting the Address Book"
• p.116 "Deleting Data on the Hard Disk"

Limiting and Controlling Access

Preventing Modification or Deletion of Stored Data
You can allow selected users to access stored scan files and files stored in Document Server.
You can permit selected users who are allowed to access stored files to modify or delete the files. For
details about limiting and controlling access, see "Specifying Access Permission for Stored Files".
Preventing Modification of Machine Settings
The machine settings that can be modified depend on the type of administrator account.
Security Measures Provided by this Machine
1
15

Advertisement

Table of Contents
loading

Table of Contents