4-18Section 4 Other Features of this FaxF-Code Based CommunicationF-Code Based Communication involves fax communication thatincludes certain codes (in the form of numbers and symbols),the base of a protocol that has been adopted for use by otherfacsimile manufacturers as well. By using these codes, methodsof transmitting confidential information – previously availableonly between facsimiles that were both from the samemanufacturer – are now becoming possible between modelsfrom different manufacturers.This fax uses an F-Code Box to transmit documents to, andreceive documents from, another party’s fax during an F-CodeBased Communication. In this case, in order to designate theF-Code Box and password, special codes are used (in this faxthey are called the “subaddress” and “F-Code password”,respectively).In this way, this fax is able to perform F-Code BasedConfidential and Bulletin Board Communications with facsimilesmade by other manufacturers and, naturally, with our ownmodels that have F-Code Based Communication capabilities.* In order to perform an F-Code Based Communication, theother party’s fax must have F-Code Based capabilities specificto the communication you are attempting.* F-Code Based Communication can be used in combinationwith the other various types of fax communication available inthis fax. In addition, if you register, in advance, the appropriatesubaddress and F-Code password under an abbreviatednumber or one-touch key, you will not need to enter thatinformation during the actual transmission or receptionprocedure. Refer to the procedures for each type of faxcommunication and for the related registration procedures formore detailed information.In this fax there are two codes used for F-Code BasedCommunication: a “subaddress” and an “F-Code password”.> SubaddressThis code must be entered by the transmitting party during anF-Code Based Confidential Transmission and by the receivingparty during an F-Code Based Bulletin Board Reception.The subaddress is used to designate the desired box (equal to theF-Code Box in this fax) that is registered in the other party’s fax.The acceptable length of the subaddress differs depending on modeland maker of the fax machine and, if the entered numbers do notmatch within the parameters of the fax machine that has the shortestacceptable length, F-Code Based Communication will not besuccessful. Consult with the other party and compare the parametersof both faxes before actually attempting an F-Code BasedCommunication. In this fax, the subaddress can be up to 20 digits inlength and can include any combination of the numerals 0 - 9.When attempting an F-Code Based Confidential Communicationor an F-Code Based Bulletin Board Communication with anotherfax of this same model, the last 4 digits of the subaddress that youenter must match the 4-digit subaddress that the other party hasregistered in their fax.> F-Code passwordThis code must also be entered by the transmitting party during anF-Code Based Confidential Transmission and by the receivingparty during an F-Code Based Bulletin Board Reception.The F-Code password is used to designate the password of thedesired box (equal to the F-Code Box in this fax) that is registeredin the other party’s fax.The acceptable length of the F-Code password differs dependingon model and maker of the fax machine and, if the enterednumbers do not match within the parameters of the fax machinethat has the shortest acceptable length, F-Code BasedCommunication will not be successful. Consult with the other partyand compare the parameters of both faxes before actuallyattempting an F-Code Based Communication. In this fax,the F-Code password can be up to 20 digits in length and caninclude any combination of the numerals 0 - 9 and the symbols“ ” and “#”.* Depending on the parameters in the receiving fax,the transmitting party may not need to enter the F-Codepassword during the actual transmission or reception procedure.If you are going to receive the documents with this fax, you canset up the procedure so that F-Code Based ConfidentialCommunication will be possible even if the transmitting partydoes not enter an F-Code password.* If you are going to transmit documents with this fax using theF-Code Based Bulletin Board Communication procedure,the receiving party will not need to enter an F-Code passwordduring the actual reception procedure if you register “0000” asthe F-Code password for that operation.(1) What is the purpose of an F-Code Box?By using codes developed for F-code Based Communication, morefunctional fax communications such as Confidential Communicationare possible with facsimiles made by other manufacturers. In order toaccomplish this, you register in the memory of your fax, in advance,a memory box and use that box to transmit documents to, andreceive documents from, the other party. That memory box is calledan “F-Code Box” in this fax and is used during F-Code BasedConfidential and Bulletin Board Communications.Each F-Code Box is registered with a subaddress and an F-Codepassword. The subaddress is used to designate the desired box(equal to the F-Code Box in this fax) that is registered in the otherparty’s fax. In this fax, that box is registered as a 4-digit number from“0000” to “9999”. The F-Code password is used to retrieve thedocuments from the box (equal to the F-Code Box in this fax).In this fax, that password is registered as a 4-digit number that caninclude any combination of the numerals 0 - 9 and the symbols “ ”and “#”.> In an F-Code Based Confidential Communication, an F-Code Boxregistered in the receiving party’s fax is used to receive theconfidential documents. If you are going to receive documents withthis fax, you must register an F-Code Box in memory in this fax.> In an F-Code Based Bulletin Board Communication, an F-CodeBox registered in the transmitting party’s fax is used to transmit theconfidential documents. If you are going to transmit documentswith this fax, you must register an F-Code Box in memory in thisfax.* You can register up to 15 F-Code Boxes (#01 - #15) in this faxmachine. (Refer to “(2) Registering F-Code Boxes”, page 4-19.)* If you want to check the information on each F-Code Box, such asthe box numbers and data regarding the existence of documents ineach respective box, print out a Confidential Box List. This listincludes information related to F-Code Boxes as well as toConfidential Boxes. (Refer to “(7) Printing Out a Confidential Box(F-Code Box) List”, page 4-17.)