Tabla de contenido
Idiomas disponibles
  • ES

Idiomas disponibles

  • ESPAÑOL, página 9
INTRODUCTION
The AR-FR24U adds a security function to the Sharp Digital Multifunctional System. As
soon as each job in copy mode, printer mode, network scanner mode and fax mode* is
finished, the security function erases the document image data that was generated and
stored in memory for the job.
* The document image data that is generated for jobs in fax mode is encrypted and then
erased from memory as soon as the job is finished.
Note:
To ensure that the data security function of the machine provides maximum security,
observe the following:
The key operator plays an important role in maintaining security. Exercise appropriate
care in selecting the person that will assume the job of key operator.
Always keep the "POWER UP AUTO CLEAR" setting on page 5 enabled.
Be sure to change the key operator code immediately each time a new person takes over
as key operator.
Change the key operator code on a regular basis (at least once every 60 days).
During the procedure for changing the key operator code, the current key operator code
and new key operator code appear in the display. Be sure to complete the procedure
promptly.
Do not select a number for the key operator code that can be easily guessed.
The key operator programs are very important for security management. The
administrator of the machine should inform users that they are not to access the key
operator programs without permission.
If the administrator and users of the machine are to be out of the office, security measures
such as locking the door of the office should be taken to prevent unauthorized access.
The customer bears responsibility for control of copies of documents made on the
machine and faxes received on the machine.
Even when the data security kit is installed, note that fax data in the public memory box
used by the facsimile expansion kit (AR-FX7) can be read.
NOTE
When the security kit is installed, the fax forwarding function of models that have the fax
function cannot be used.
CONTENTS
INTRODUCTION...................................................................................................................1
WHEN THE SECURITY KIT IS INSTALLED.........................................................................2
KEY OPERATOR PROGRAMS ............................................................................................3
KEY OPERATOR PROGRAM LIST.................................................................................3
USING THE KEY OPERATOR PROGRAMS ..................................................................3
SETTINGS AND USE OF THE SECURITY FUNCTION ......................................................3
ABOUT THE SECURITY FUNCTION .............................................................................4
1
ENGLISH
Tabla de contenido
loading

Tabla de contenido