Ricoh Aficio MP C2500 EFI 기능 설명서 - 페이지 21

{카테고리_이름} Ricoh Aficio MP C2500 EFI에 대한 기능 설명서을 온라인으로 검색하거나 PDF를 다운로드하세요. Ricoh Aficio MP C2500 EFI 27 페이지. Security features guide

There are two modes:
Mask Type for Copying is a standard RPCS feature that
embeds a masking pattern and/or message within the
original printout. If copies are made, an embedded
message or the document originator's name appears
on top of one of the selected masking patterns (shown
above). Users can design the message just as they
would a typical watermark.
Data Security for Copying produces a page in which
the entire image area is grayed out, making the
document illegible.

Commercial Facsimile Security Solutions

Facsimile is included in this Security Solutions review as it remains a viable communication technology
and Ricoh supports a complete line of stand-alone Super G3 laser fax solutions, as well as network fax
systems and fax board options that can be installed within MFPs.
Even though a standard G3 fax unit utilizes digital scanning and printing it uses a modem for
communication over a standard phone line. Since most standard phone lines are analog the modem
converts the digital data to a format that can be sent over the analog phone lines. The receiving
machine converts the analog data back to digital data so that the fax system can process and print it.
Therefore, fax has a different set of security features and customers have a different set of questions for
fax based solutions.
The most common question is whether a customer's data network can be penetrated via the fax
connection on stand-alone fax system, network fax system, or an MFP with fax capability. The answer is
NO. A Ricoh standalone fax, network fax or MFP with fax uses only a Class 1 modem that only controls
fax transmission/reception. Regardless if fax is part of a network fax or an MFP connected to a network,
the modem is physically separated from the main processor or any other network port. The fax modem
cannot accept or understand any PDL or device command stream other than those conforming to
established fax protocols, and therefore a data network cannot be breached via the fax modem.
18