Skip header
 

Unauthorized Copy Prevention / Data Security for Copying

The printer function allows you to embed a pattern in a printed copy to discourage or prevent unauthorized copying.

If the Unauthorized Copy Prevention function is enabled, embedded text patterns (for instance, a warning message such as "No Copying") are displayed when documents are copied illegally. Accordingly, unauthorized copying can be prevented.

If the Data Security for Copying function is used and settings for special patterns embedded in documents are enabled, copies of documents with embedded patterns are printed with gray overprint. Accordingly, information leakage can be prevented. To protect documents by gray overprint, install the copier or multi-function printer with the Copy Data Security Unit.

If a machine installed with the Copy Data Security Unit detects a file protected by the Data Security for Copying function, the machine beeps and logs the unauthorized copying.

For more information, see below:

Using Unauthorized Copy Prevention

  1. Enable printing of the embedded pattern. The machine administrator configures this setting. For details about how to configure the setting, see Enabling Pattern Printing.

  2. Specify the settings for unauthorized copy prevention in the printer function. The privilege to specify the setting depends on the setting specified in [Compulsory Unauthorized Copy Prevention]. For details, see Enabling Pattern Printing.

Using Data Security for Copying

  1. Enable the embedded pattern print setting. The machine administrator configures this setting. For details about how to configure the setting, see Enabling Pattern Printing.

  2. Specify the settings for data security for copying in the printer function. The privilege to specify the setting depends on the setting specified in [Compulsory Unauthorized Copy Prevention]. For details, see Enabling Pattern Printing.

  3. Configure the "Detect Data Security for Copying" setting for printed copies, so that documents are printed with gray overprint when they are illegally copied, faxed, scanned, or stored in the machine. The machine administrator configures this setting. For details about how to configure the setting, see Enabling Detect Data Security for Copying.