e-ManualTopSite mapHelpGlossary

Category Top

Preventing Unauthorized Access

Increasing Security

Network Security

Key Pair and Server Certificate Settings for Encrypted SSL Communication

Generating a Key Pair and Server Certificate

Registering a Key Pair File and Server Certificate File Installed from a Computer

Editing Key Pairs and Server Certificates

Registering/Editing a CA Certificate File

Verifying Certificate Validity Using Certificate Revocation List

Network Settings/Management when Using an Advanced Box

MEAP Settings

Using the SSL

Printing Installed Application Information

Preventing Information Leakage

Digital Signatures

Setting/Confirming a Key Pair and Device Certificate

Confirming a Key Pair and User Certificate

Checking a Device Signature/User Signature Certificate

Setting a Rights Management Server

Forced Secure Watermark/Document Scan Lock

Secure Watermark (Forced Secure Watermark/Printer Driver Secure Watermark)

Adjusting the Secure Watermark Contrast

Document Scan Lock Settings

Specifying the Document Scan Lock Operational Settings
Setting the Document Scan Lock Mode
Adjusting the TL Code

Copy Set Numbering Options

Accepting Only Encrypted Secure Printing

Restricting the Send Function

Setting the Address Book

Mail Box Settings

Specifying Settings for All Mail Boxes

Specifying the Mail Box Security Settings

Setting the Control Panel Display

Managing the Setting Information Registered in the Machine

Specifying Management Settings for the Memory

Completely Erasing Unnecessary Data from the Memory

Initializing All Data/Settings

TPM Settings

Device Management

Using the USB Port

Device Information Settings

Specifying Device Information Distribution Settings

Registering/Deleting/Printing Distribution Destinations

Setting the Receiving Machine

Setting Automatic Distribution

Setting Manual Distribution

Checking/Printing the Communication Log

Limiting Functions

Remote UI

Clearing the Message Board

Saving a Log of Key Operations

Starting the Setup Guide

Retrieving Audit Logs

IEEE 2600 Security Standard

Top » Security » Preventing Information Leakage » Forced Secure Watermark/Document Scan Lock
Forced Secure Watermark/Document Scan Lock
0R9W-202
Secure Watermark/Document Scan Lock mode enables you to prevent information leakage. These modes can be set by administrator so that it is always reflected on the output by the general users. (See "Setting Administrators.")
The administrator can set the Secure Watermark/Document Scan Lock mode for all copy and print jobs, and also set whether to use the Secure Watermark/Document Scan Lock mode for each print job from the printer driver.
IMPORTANT
For information on the optional products required to use this function, see "Optional Products Required for Each Function."
The Document Scan Lock mode does not guarantee restriction of unauthorized copying. You may not be able to restrict unauthorized copying or analyze tracking information, depending on the combination of settings and the output, such as a document with an image on the entire page.
Please note that Canon will not be held responsible for any damages caused by the use of the Document Scan Lock mode or the inability to use the Document Scan Lock mode.
Secure Watermark
This mode enables you to embed text, such as "CONFIDENTIAL," the date and time, or custom characters on the output so that the embedded text appears when the copies are copied. You can prevent unauthorized copying by the third party because you can distinguish between the original and copies of originals.
Original
Copy A
(Secure Watermark Is Set)
Copy B
(Copy of Copy A)

Document Scan Lock
This mode enables you to embed scan lock information and tracking information on the copies/prints to restrict job operation. When the output with embedded information is scanned, the machine restricts operation according to the specified settings of embedded scan lock information.
With this settings, you can restrict unauthorized copying/printing, and also analyze embedded information on the output and find out who, when, and with which machine the copy or print was made.
You can embed these information using the TL code.
Original
Copy/Print
Output
The dots are printed in the background of output.
A TL code is a type of 2-dimensional bar code. A TL code is printed and by changing the arrangement of the dots, digital information is embedded on the output.
The following information can be used with this mode.
Scan Lock Information
When the output with embedded scan lock information is scanned, the machine detects embedded information and restricts unauthorized copying and printing.
Original
Output with Embedded TL Code
(Scan Lock Information)
Jobs are restricted.
Copy/Print
Copy/Send/Store
Specify the detailed settings for embedding information beforehand such as whether to set the machine always prohibit copying and printing the document with embedded scan lock information. (See "Document Scan Lock Settings.")
Tracking Information
You can embed tracking information such as date/time, user name, and device name for the job operation.
You can analyze embedded tracking information on the output, and find out who, when, and with which machine the document was output. The information analyzing tool is required to analyze tracking information. For more information, see "Document Scan Code Analyzer for MEAP" in the manual.
You can analyze embedded tracking information in the TL code printed on the output, and find out who, when, and with which machine the document was output. The information analyzing tool is required to analyze tracking information.
Tracking Information
(Original)
Tracking Information
(Original)
Copy/Print
Copy