Preventing Unauthorized Use
The machine handles a variety of information including the Address Book. It also provides various settings to ensure efficient management and operation. While this information and the settings provide convenience, they can also lead to information leakage and other security issues if the information and settings can be accessed by anyone.
You can take measures to restrict access and disable functions according to the usage status of the function, to ensure safer use of the machine.
Restricting Access to Information and Settings
Restricting users and operations accessing information and settings on the machine can help prevent unauthorized use and protect confidential information.
Restricting Address Book Registration and Editing (Touch Panel Model)Restricting Use of Remote UIRestricting Use from a Mobile DeviceDisabling Unused Functions
See Also