![Oce im4511 Operating Manual Download Page 3](http://html1.mh-extra.com/html/oce/im4511/im4511_operating-manual_3307596003.webp)
1
Contents
Introduction ...........................................................................................................................1
When the data security kit is installed ...................................................................................3
●
About confidential folders and confidential files of the document filing function..............3
●
Restrictions on tandem copying and tandem printing......................................................3
●
Security settings in the Web page ...................................................................................4
●
About transfer of copied data to the machine..................................................................4
KEY OPERATOR PROGRAMS............................................................................................5
●
KEY OPERATOR PROGRAM LIST ................................................................................5
●
Using the key operator programs ....................................................................................5
●
SECURITY SETTINGS ...................................................................................................5
●
PRODUCT KEY.............................................................................................................11
Introduction
The ZB3500650 adds a security function to the Imagistics Laser Printer. When the copy
function, printer function, network scanner function, or fax function of a Imagistics Laser
Printer with the security function is used, the image data that is generated for the job is
encrypted, and when the job is finished, the encrypted data is immediately erased from
memory and the hard disk.
Note:
To ensure that the data security function of the data security kit provides maximum security,
please observe the following:
●
The key operator plays an important role in maintaining security. Exercise appropriate care in
selecting the person that will assume the job of key operator for the data security kit.
●
Be sure to change the key operator code immediately each time a new person takes over
as key operator.
●
Change the key operator code on a regular basis (at least once every 60 days).
●
During the procedure for changing the key operator code, the current key operator code
and new key operator code appear in the display. Be sure to complete the procedure
promptly.
●
Do not select a number for the key operator code that can be easily guessed.
●
The key operator programs are very important for security management. If it becomes
necessary to leave the machine during use of the key operator programs, be sure to
press the [CA] key to exit the key operator programs. The administrator of the machine
should inform users that they are not to access the key operator programs without
permission.
●
If the administrator and users of the machine are to be out of the office, security measures
such as locking the machine should be taken to prevent unauthorized access.
●
The customer bears responsibility for control of documents copied and faxes received
using the data security kit.
●
Even when the data security kit is installed, note that fax data in the public memory box
used by the facsimile expansion kit can be read.
AR-FR21_US.fm 1
ページ
2005年1月21日 金曜日 午後2時11分