- ページ 21
プリンター Ricoh Aficio 615CのPDF 機能マニュアルをオンラインで閲覧またはダウンロードできます。Ricoh Aficio 615C 27 ページ。 Security features guide
Ricoh Aficio 615C にも: クイックマニュアル (12 ページ)
There are two modes:
■
Mask Type for Copying is a standard RPCS feature that
embeds a masking pattern and/or message within the
original printout. If copies are made, an embedded
message or the document originator's name appears
on top of one of the selected masking patterns (shown
above). Users can design the message just as they
would a typical watermark.
■
Data Security for Copying produces a page in which
the entire image area is grayed out, making the
document illegible.
Commercial Facsimile Security Solutions
Facsimile is included in this Security Solutions review as it remains a viable communication technology
and Ricoh supports a complete line of stand-alone Super G3 laser fax solutions, as well as network fax
systems and fax board options that can be installed within MFPs.
Even though a standard G3 fax unit utilizes digital scanning and printing it uses a modem for
communication over a standard phone line. Since most standard phone lines are analog the modem
converts the digital data to a format that can be sent over the analog phone lines. The receiving
machine converts the analog data back to digital data so that the fax system can process and print it.
Therefore, fax has a different set of security features and customers have a different set of questions for
fax based solutions.
The most common question is whether a customer's data network can be penetrated via the fax
connection on stand-alone fax system, network fax system, or an MFP with fax capability. The answer is
NO. A Ricoh standalone fax, network fax or MFP with fax uses only a Class 1 modem that only controls
fax transmission/reception. Regardless if fax is part of a network fax or an MFP connected to a network,
the modem is physically separated from the main processor or any other network port. The fax modem
cannot accept or understand any PDL or device command stream other than those conforming to
established fax protocols, and therefore a data network cannot be breached via the fax modem.
18