Canon 700 All in One Printer User Manual


 
CHAPTER
4-1
CF-PL Reference Guide_USEN HT1-2187-000-V.1.0
4
Restricting the Use of the Machine
This chapter describes how to protect the machine from unauthorized access. Some of these
features also enable you to keep track of fax transactions based on division numbers or user
access codes that you can assign to individuals or sections inside your company.
Setting and Using the System Administrators ID and Password . . . . . . . . . . . . . . . . . . .4-2
Setting the System Administrators ID and Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-2
Changing/Canceling the System Administrators ID and Password . . . . . . . . . . . . . . . . . . . . . .4-4
Restricting Machine Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-6
Setting Operation Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-6
Turning Restrictions OFF or ON . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-10
Restricting the Use of the Telephone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-12
Operating the Machine with Restrictions ON. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-13
Checking and Clearing the Counter Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-14
Using Memory Lock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-17
Setting a Time and Password for Memory Lock. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-17
Turning Memory Lock ON . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-20
Turning Memory Lock OFF and Printing Documents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-21
Setting Up and Using PIN Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-22
Setting a PIN Code. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-22
Dialing with a PIN Code after the Number. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-24
Dialing with a PIN Code before the Number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-26
Setting PIN Code Access for Speed Dialing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-27
Using Speed Dialing with PIN Code Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-29
Forced PIN Code Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-31