Enhanced Security
This machine's security functions can be enhanced by managing the machine and its users using the
improved authentication functions.
By specifying
access limits for the machine's functions and the documents and data stored in the machine,
information leaks and unauthorized access can be prevented.
Data encryption also prevents unauthorized data access and tampering via the network.
The machine also automatically checks the configuration and manufacturer of the firmware each time the
main power is switched on and whenever firmware is installed.
Authentication and Access Limits
Using authentication, administrators manage the machine and its users. To enable authentication,
information about both administrators and users must be registered in order to authenticate users via
their login user names and passwords.
Four types of administrators manage specific areas of machine usage, such as settings and user
registration.
Access limits for each user are specified by the administrator responsible for user access to machine
functions and documents and data stored in the machine.
For details about the administrator, see "Administrators".
For details about the user, see "Users".
Encryption Technology
This machine can establish secure communication paths by encrypting transmitted data and
passwords.
• p.23 "Administrators"
• p.37 "Users"
Enhanced Security
15