Ricoh FAX4430L Features Manual - Page 22
Browse online or download pdf Features Manual for Fax Machine Ricoh FAX4430L. Ricoh FAX4430L 27 pages. Security features guide
Also for Ricoh FAX4430L: Brochure & Specs (6 pages)
Ricoh Aficio Common Security Features Guide
After you allay your customer's concerns about potential fax network threats, you can speak to a number
of security features that are designed to improve basic faxing security in commercial fax environments.
The following features apply to Ricoh stand-alone fax machines, network fax systems, and also to any
MFP device that offers a Ricoh-engineered Super G3 Fax option.
Closed Network
With Closed Networks, the ID codes of the communicating machines are checked. If they are not
identical, the communication is terminated, thus preventing possibly confidential documents from being
transmitted intentionally or accidentally to the wrong location(s), i.e., outside the network. (Note: Closed
Network requires all fax systems be Ricoh systems with closed network capability.)
Confidential Transmission/Reception
This feature enables the user to transmit/receive faxes to a mailbox that is passcode-protected.
Messages are only printed after the recipient enters the proper passcode, providing an enhanced level
of security when communicating between machines.
IP-fax
When the NIC FAX Unit is installed Ricoh facsimile systems support secure T.38 real-time IP-fax over a
corporate Intranet. This not only bypasses costly phone lines, but also operates behind the firewall for
secure point-to-point transmissions.
ITU-T Sub-address Routing
Using a Sub-address appended to a fax number (think of it like an extension on a business phone
number), it is possible to route a fax directly to the recipient's PC via their e-mail address. When
received directly to a PC, confidentiality is enhanced as the recipient can view the message and print a
copy at their convenience.
Memory Lock
Similar to the Secure Print feature on a printer or MFP, when this feature is enabled documents from
identified senders or all senders are retained in memory. Only after the Memory Lock ID is entered at
the control panel will the documents stored in memory be printed, preventing transmissions from sitting
unattended on a reception tray for passers-by to read until collected.
Restricted Access
Restricted Access allows customers to track and trace machine usage and deter casual passers-by from
using the fax. Authorized users must enter a code before they can use the machine. Activity reports
document the time and destination of every call. Further, this function can be linked to the Night Timer
feature so that Restricted Access is activated during desired times to prevent after-hours access.
Security PIN Code Protection
To prevent accidental exposure of a PIN Code or Personal ID, any character after a certain position in
the destination's dial number will be concealed both in the LCD panel and activity report.
19