Page 4 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.
7.3
7.3
7.3
7.3
Document Access Control Function
Document Access Control Function
Document Access Control Function
Document Access Control Function ................................
................................
................................
................................................................
................................
................................
.............................................
.............
.............
............. 82
82
82
82
7.4
7.4
7.4
7.4
Use
Use
Use
Use----of
of
of
of----Feature Restriction Function
Feature Restriction Function
Feature Restriction Function
Feature Restriction Function ................................
................................
................................
................................................................
................................
................................
...........................................
...........
...........
........... 84
84
84
84
7.5
7.5
7.5
7.5
Network Protection Function
Network Protection Function
Network Protection Function
Network Protection Function................................
................................
................................
................................................................
................................
................................
.......................................................
.......................
.......................
....................... 85
85
85
85
7.6
7.6
7.6
7.6
Residual Data Ov
Residual Data Ov
Residual Data Ov
Residual Data Overwrite Function
erwrite Function
erwrite Function
erwrite Function................................
................................
................................
................................................................
................................
................................
..............................................
..............
..............
.............. 85
85
85
85
7.7
7.7
7.7
7.7
Stored Data Protection Function
Stored Data Protection Function
Stored Data Protection Function
Stored Data Protection Function ................................
................................
................................
................................................................
................................
................................
.................................................
.................
.................
................. 86
86
86
86
7.8
7.8
7.8
7.8
Security Management Function
Security Management Function
Security Management Function
Security Management Function ................................
................................
................................
................................................................
................................
................................
..................................................
..................
..................
.................. 86
86
86
86
7.9
7.9
7.9
7.9
Software Verification Function
Software Verification Function
Software Verification Function
Software Verification Function ................................
................................
................................
................................................................
................................
................................
....................................................
....................
....................
.................... 91
91
91
91
7.10
7.10
7.10
7.10 Fax Line Separation Function
Fax Line Separation Function
Fax Line Separation Function
Fax Line Separation Function ................................
................................
................................
................................................................
................................
................................
.....................................................
.....................
.....................
..................... 91
91
91
91