4. Preventing Leakage of Information
from Machines
This chapter explains how to protect information if it is stored in the machine's memory or on the hard
disk.
Protecting the Address Book
You can specify who is allowed to access the data in the Address Book. To protect the data from
unauthorized users, you can also encrypt the data in the Address Book.
Specifying Address Book Access Permissions
Access permissions can be specified by the users registered in the Address Book, users with full control
privileges, and user administrator.
1.
Log in as the user administrator from the control panel.
2.
Press [Address Book Mangmnt].
3.
Select the user whose access permission you want to change.
4.
Press [Protection].
51
Содержание PRO C9100
Страница 2: ......
Страница 8: ...List of Operation Privileges for Address Books 229 INDEX 231 6...
Страница 24: ...1 Getting Started 22...
Страница 72: ...4 Preventing Leakage of Information from Machines 70...
Страница 116: ...5 Enhanced Network Security 114...
Страница 176: ...6 Managing the Machine 174...
Страница 188: ...7 Troubleshooting 186...
Страница 218: ...System Log Settings User Mach N W File Unset Set System Log R R R R R 8 List of Operation Privileges for Settings 216...
Страница 220: ...Settings User Mach N W File Unset Set Device Access Violation R W 8 List of Operation Privileges for Settings 218...
Страница 235: ......
Страница 236: ...EN GB EN US EN AU M238 1022 2014...