4. Protecting Document Data
Information from Leaks
This chapter describes how to protect document data and information transmitted through the network from
unauthorized viewing and modification.
Preventing Unauthorized Copying
In Printer Features, using the printer driver, you can embed a pattern in the printed copy to discourage or
prevent unauthorized copying.
The unauthorized copy prevention function prevents unauthorized copies of documents by embedding a
text pattern (for instance, a warning such as "No Copying") that you can set on the print driver (which will
appear on printed copies).
Data security for copying prevents document information leaks by graying out copies of documents that
were printed with the data security for copying pattern enabled in the printer driver.
However, in order to gray out the security pattern, the Copy Data Security Unit is required for the copier
or multi-function printer.
For more information, see the information below.
Unauthorized Copy Prevention
1. Using the printer driver, specify the printer settings for unauthorized copy prevention. For details
on how to specify settings for unauthorized copy prevention, see "Specifying Printer Settings for
Unauthorized Copy Prevention (Printer Driver Setting)".
Data Security for Copying
1. Using the printer driver, specify the printer settings for data security for copying. For details on
how to specify settings on the printer driver, see "Specifying Printer Settings for Data Security for
Copying (Printer Driver Setting)".
2. Set the data security for copying function to appear gray when documents with the function are
copied or scanned. For details on how to specify settings on the machine, see "Specifying Data
Security for Copying (Machine Setting)".
• p.101 "Specifying Printer Settings for Unauthorized Copy Prevention (Printer Driver Setting)"
• p.101 "Specifying Printer Settings for Data Security for Copying (Printer Driver Setting)"
• p.102 "Specifying Data Security for Copying (Machine Setting)"
97
4
Содержание Aficio MP C2030
Страница 2: ......
Страница 10: ...INDEX 245 8 ...
Страница 47: ...9 Press Exit 10 Press the OK key 11 Press the User Tools Counter key User Code Authentication 45 3 ...
Страница 118: ...6 Press the User Tools Counter key 5 Managing Access to the Machine 116 5 ...
Страница 128: ...5 Managing Access to the Machine 126 5 ...
Страница 153: ... p 26 Registering the Administrator Protection Using Encryption 151 6 ...
Страница 194: ...8 Troubleshooting 192 8 ...
Страница 249: ...MEMO 247 ...
Страница 250: ...MEMO 248 GB GB EN USA AE AE D040 ...
Страница 251: ...Copyright 2008 ...