Skip header
ManualsContentsPreviousNextHelp

Preventing Information Leaks

Guarding Against Unauthorized Copying (Unauthorized Copy Prevention)

Using the printer driver, mask and pattern can be embedded in the printed document.

Guarding Against Unauthorized Copying (Data security for copying)

Using the printer driver with the data security for the copying function, a document can be printed with an embedded pattern of hidden text.

To gray out the copy or stored file of a copy-guarded document when the document is copied or stored , the optional security module is required.

Printing confidential files

Using the printer's Locked Print, files can be stored in the printer as confidential files and then print them. Those file can be printed using the printer's control panel and collected on the spot to prevent others from seeing it.

Preventing Data Leaks Due to Unauthorized Transmission

You can specify in the address book which users are allowed to send files using the scanner or fax function.

You can also limit the direct entry of destinations to prevent files from being sent to destinations not registered in the address book.

Protecting Registered Information in the Address Book

This function allows administrator to specify which users have permission to access the data in the address book. Usage of the data in the address book by unregistered users can be prevented.

Administrator can also encrypt the data in the address book to protect the data from unauthorized reading.

Managing Log Files

Data security can by improved by deleting log files stored in the printer. By transferring the log files, administrator can check the history data and identify unauthorized access.

To transfer the log data, the log collection server is required.

Overwriting the Data on the Hard Disk

Before disposing of the printer, make sure all data on the hard disk is deleted. Prevent data leakage by automatically deleting transmitted printer jobs from memory.

To overwrite the hard disk data, the optional ipp unit is required.