Ricoh Pro C700EX Series 기능 설명서 - 페이지 22

{카테고리_이름} Ricoh Pro C700EX Series에 대한 기능 설명서을 온라인으로 검색하거나 PDF를 다운로드하세요. Ricoh Pro C700EX Series 27 페이지. Security features guide
Ricoh Pro C700EX Series에 대해서도 마찬가지입니다: 브로셔 및 사양 (6 페이지)

Ricoh Aficio Common Security Features Guide
After you allay your customer's concerns about potential fax network threats, you can speak to a number
of security features that are designed to improve basic faxing security in commercial fax environments.
The following features apply to Ricoh stand-alone fax machines, network fax systems, and also to any
MFP device that offers a Ricoh-engineered Super G3 Fax option.

Closed Network

With Closed Networks, the ID codes of the communicating machines are checked. If they are not
identical, the communication is terminated, thus preventing possibly confidential documents from being
transmitted intentionally or accidentally to the wrong location(s), i.e., outside the network. (Note: Closed
Network requires all fax systems be Ricoh systems with closed network capability.)

Confidential Transmission/Reception

This feature enables the user to transmit/receive faxes to a mailbox that is passcode-protected.
Messages are only printed after the recipient enters the proper passcode, providing an enhanced level
of security when communicating between machines.

IP-fax

When the NIC FAX Unit is installed Ricoh facsimile systems support secure T.38 real-time IP-fax over a
corporate Intranet. This not only bypasses costly phone lines, but also operates behind the firewall for
secure point-to-point transmissions.

ITU-T Sub-address Routing

Using a Sub-address appended to a fax number (think of it like an extension on a business phone
number), it is possible to route a fax directly to the recipient's PC via their e-mail address. When
received directly to a PC, confidentiality is enhanced as the recipient can view the message and print a
copy at their convenience.

Memory Lock

Similar to the Secure Print feature on a printer or MFP, when this feature is enabled documents from
identified senders or all senders are retained in memory. Only after the Memory Lock ID is entered at
the control panel will the documents stored in memory be printed, preventing transmissions from sitting
unattended on a reception tray for passers-by to read until collected.

Restricted Access

Restricted Access allows customers to track and trace machine usage and deter casual passers-by from
using the fax. Authorized users must enter a code before they can use the machine. Activity reports
document the time and destination of every call. Further, this function can be linked to the Night Timer
feature so that Restricted Access is activated during desired times to prevent after-hours access.

Security PIN Code Protection

To prevent accidental exposure of a PIN Code or Personal ID, any character after a certain position in
the destination's dial number will be concealed both in the LCD panel and activity report.
19