Instruction manual

Sharp MX-3501N
www.BERTL.com
tel. (1) 732-761-2311
fax. (1) 732-761-2312
info@BERTL.com
Copyright © 2006 MCA Internet, LLC dba BERTL 2-May-06
All Rights Reserved. The license under which this document is made available and applicable law prohibit any
reproduction or further transmission of any portion of this document. This document may only be viewed elec-
tronically through the www.BERTL.com Web site and may not be stored in electronic or hard copy format. Any
reproduction of trademarks is strictly prohibited. BERTL accepts no responsibility for any inaccuracies or
omissions contained in this document.
Page 17
Color at Work
®
Security
In addition, the device also supports
network authentication with NTLM and
LDAP servers. This forces users to enter
their network username and password
before they are granted access to the
device. Passwords can be safeguarded
while being sent across the network
through the Sharp’s support for both
Kerberos and Digest MD5 encryption.
Once authenticated, the administrator can
set up the From Form field within the send
functions of the device to be force-
populated with the login users details, thus
providing an audit trail for communications.
To safeguard documents being sent to,
and those stored on the device, Sharp
offers a range of solutions.
For print and fax jobs arriving at the
device, the Sharp MX-3501N supports
secure print and F-code fax. These two
functions allow users to send documents
with PIN codes thus
rendering the
documents secure at
the device until the
authorized user enters
the PIN to release the
job.
The same PIN
protection can be
applied to stored
documents in the
document filing area of
the device.
For maximum security environments, an
additional Data Security Kit supports a
second layer of security applied at the hard
drive level. The Kit secures the device
three ways.
Privacy: 128-bit encryption ensures
that all files stored on the hard disk
remains a secret.
Memory Clear: Internal memory can
be automatically or manually cleared
after each operation.
Data Overwrite: Automatically
overwrites ROM, RAM, and disk
blocks with random data.
Above: Image Send communications can be secured
using a password to encrypt PDF attachments.
Below: Secure print jobs can be listed and printed in a
single step using the Batch print process.