Owner's Manual
Table Of Contents
- TABLE OF CONTENTS
- How to Read the Manuals
- Model-Specific Information
- Names of Major Features
- 1. What You Can Do with This Machine
- I Want to Save Paper
- I Want to Convert Documents to Electronic Formats Easily
- I Want to Register Destinations
- I Want to Operate the Machine More Effectively
- You Can Customize the [Home] Screen as You Like
- You Can Make Copies Using Various Functions
- You Can Print Data Using Various Functions
- You Can Utilize Stored Documents
- You Can Connect Two Machines for Copying
- You Can Send and Receive Faxes without Paper
- You Can Send and Receive Faxes Using the Internet
- You Can Send and Receive Faxes by Using the Machine without Fax Unit Installed
- You Can Use the Facsimile and the Scanner in a Network Environment
- You Can Prevent Information Leakage (Security Functions)
- You Can Monitor and Set the Machine Using a Computer
- You Can Prevent an Unauthorized Copy
- 2. Getting Started
- 3. Copy
- 4. Fax
- 5. Print
- 6. Scan
- Basic Procedure When Using Scan to Folder
- Basic Procedure for Sending Scan Files by E-mail
- Basic Procedure for Storing Scan Files
- Specifying the File Type
- Specifying Scan Settings
- 7. Document Server
- 8. Web Image Monitor
- 9. Adding Paper and Toner
- 10. Troubleshooting
- Indicators
- When an Indicator for the [Check Status] Key Is Lit
- Panel Tone
- When You Have Problems Operating the Machine
- When Messages Are Displayed on the Control Panel
- When Messages Are Displayed on Your Computer Screen
- 11. Appendix
- INDEX

You Can Prevent Information Leakage
(Security Functions)
CJQ608
• You can protect documents from unauthorized access and stop them from being copied without
permission.
• You can control the use of the machine, as well as prevent machine settings from being changed
without authorization.
• By setting passwords, you can prevent unauthorized access via the network.
• You can erase or encrypt the data on the hard disk to prevent the information from leaking out.
• You can limit the volume of the usage of the machine for each user.
• See Security Guide .
1. What You Can Do with This Machine
24