Specifications
Print Controller Design Guide for Information Security:
Page 25 of 92
8. Data Protection
Protection of Address Book Data
• The tables below show the various types of data stored in Address Book entries as well as the
operations that general users/groups, owners and user administrators can perform on this data. It is
possible to assign general user access privileges to individual users as well as to groups. Users
who have not been assigned any access privileges are not able to view the contents of Address
Book entries.
• There are four levels of access privileges: View, Edit, Edit/Delete, and Full-Access. These settings
can be changed by Group and User Administrators, users with Full-Access privileges and the user
who registered the entry. User Administrators are also able to change user passwords.
• The data in the Address Book is stored in the HDD or SD card. This data can be encrypted before it
is stored if the Printer/Scanner option is installed.
Access Privilege Management Structure for the Address Book
General Users
Groups
Owner of
the Entry
(User)
User Administrator
Reg. No. 00001
Name Taroh Ricoh
R
Email address*1 taroh@ricoh.co.jp
FAX No. *1 1234-5678
General Info.
… …
Use ACL
RW
Login password*2 **********
Authent. Username*1 Taroh
Authent. Password*1, *2
**********
Protection Code ****
Detailed User
Info.
-
RW
R
Login Username Taroh
Authorized Usage Copier
Admin.
Data
… …
- R RW
ACL Information
00002=R---
00003=RW--
00004=RW-O
00005=RWDO
…
Use ACL RW RW
Note:
*1: This item does not appear in the Address Book on LP models.
*2: This password can only be changed by users with Write privileges. As the user inputs the password, it
is displayed as asterisks.