Note:
To ensure that the data security function of the machine provides maximum security,
observe the following:
The key operator plays an important role in maintaining security. Exercise appropriate
●
care in selecting the person that will assume the job of key operator.
Always keep "POWER UP AUTO CLEAR" (page 5 of this manual) enabled.
●
Be sure to change the key operator code immediately each time a new person takes over
●
as key operator.
Change the key operator code on a regular basis (at least once every 60 days).
●
During the procedure for changing the key operator code, the current key operator code
●
and new key operator code appear in the display. Be sure to complete the procedure
promptly.
Do not select a number for the key operator code that can be easily guessed.
●
The key operator programs are very important for security management. The
●
administrator of the machine should inform users that they are not to access the key
operator programs without permission.
If the administrator and users of the machine are to be out of the office, security measures
●
such as locking the door of the office should be taken to prevent unauthorized access.
The customer bears responsibility for control of copies of documents made on the
●
machine and faxes received on the machine.
Even when the data security kit is installed, note that fax data in the public memory box
●
used by the facsimile expansion kit (AR-FX10) can be read.
CAUTION
When "POWER UP AUTO CLEAR" (explained on page 5 of this manual) is enabled, the
wait time when the machine is powered on may occasionally be very long.
KEY OPERATOR PROGRAMS
This section explains the key operator programs in the unit that are related to the security function.
KEY OPERATOR PROGRAM LIST
Program name
DEVICE CONTROL
SECURITY SETTINGS
CLEAR ALL MEMORY
NUMBER OF TIMES CLEAR ALL MEMORY PROGRAM IS REPEATED
POWER UP AUTO CLEAR
DISABLE PRINTING OF SENDING ADDRESS LIST
PRODUCT KEY
DATA SECURITY KIT
Using the key operator programs
Follow the procedure on pages 3 and 4 of the key operator's guide to configure the settings
in the key operator programs.
For explanations of each of the settings, see the following pages.
2
Page
4
4
5
5
5