Preventing Information Leakage
There are many possibilities connected to information leakage regarding documents and data handling; such as when you have left behind your original or output on the machine after you have made a copy or printed, or when a transmission error has occurred when you have tried to send your file or document.
On this machine, you can create a PDF with digital signature that verifies the data creator and that the data has not been altered.
To minimize the possibility of information leakage, this machine can be equipped with several security features, the Secure Watermark mode to prevent unauthorized copying, the Limit New Destinations mode to prevent unauthorized send, and the Destination Confirmation mode to prevent transmission error.
Also, by specifying restrictions on the display of the Address Book or the Status Monitor/Cancel screen on the touch panel display of the machine, you can prevent unauthorized use of the machine or browsing by the unauthorized user.
Digital Signature
This mode displays the signature on the digital document, which indicates the source and therefore the legitimacy of the document. By using the public key encryption method, you can verify the data creator and that the data has not been altered.
The structure of a digital signature is indicated below. By comparing the encrypted data from the sender with the public key, the receiver can check the legitimacy of the sender and data.
(See "Generating and Confirming a Key Pair and Device Signature Certificate and User Certificate for Adding Digital Signatures to PDF or XPS Files.")
You can create the following types of digital signature PDF on this machine.
Device Signature
User Signature
Besides the digital signature, you can create an encrypted PDF by registering a password to the PDF to prevent unauthorized browsing by a third party.
(See "Encrypting PDF Files.")
Preventing Output Information Leakage
The following modes can be set by administrator so that it is always reflected on the output by the general users.
Secure Watermark
This mode enables you to embed text, such as "CONFIDENTIAL," the date and time, or custom characters on the output so that the embedded text appears when the copies are copied. You can prevent unauthorized copying by the third party because you can distinguish between the original and copies of originals.
(See "Specifying Secure Watermark.")
Copy Set Numbering Extension Mode
This mode enables you to print the user name, the date and time, and custom characters in addition to the copy set number when copying/printing. By printing the copy set number and other information, you can prevent unauthorized copying by a third party.
(See "Copy Set Numbering Options.")
Only Allow Encrypted Print Jobs Mode
The Encrypted Secure Print is a mode that strengthens the security by encrypting print data on a computer and decoding the encryption on the machine. This mode helps prevent the contents of your printed documents from being seen by other users and prevent leakage of confidential information. For instructions on Secured Print and Encrypted Secure Print, see
"Secured Print ." If you are using the imageRUNNER ADVANCE C2020, depending on the region, the 2.5inch/80GB HDD is required to use the Encrypted Secure Print mode. For information on the optional products required to use Encrypted Secure Print, see
"Optional Products Required for Each Function."
Also, you can set the machine to only receive encrypted secured print jobs from computers.
With this setting, you can prevent leaving behind or losing outputs since output is only possible when the password is entered.
(See "Accepting Only Encrypted Secured Printing.")
Preventing Information Leakage from Sending
You can prevent information leakage that occurs during sending such as entering a wrong destination by confirming the entry of destination or restricting new destinations/domain. See
"Restricting the Send Function" or
"Setting the Address Book."
Control Panel Display Restrictions
You can restrict the browsing and the use of the Status Monitor/Cancel screen and Address Book by specifying settings for each function.
(See "Setting the Control Panel Display.")