BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a view showing one example of the appearance of an MFP 100.
FIG. 2 is a diagram showing one example of the hardware construction of the MFP 100.
FIG. 3 is a diagram useful in explaining about boxes.
FIG. 4 is a diagram showing one example of the content of a table storing access control information for each box.
FIG. 5 is a diagram showing one example of the content of a table storing access control information for each file.
FIG. 6 is a block diagram useful in explaining one example of the functional construction of the MFP 100 in which an access control apparatus according to a first embodiment has been installed.
FIG. 7 is a flowchart useful in explaining the content of processing.
FIG. 8 is a view showing an example where a list of boxes has been displayed on a display unit 12.
FIG. 9 is a view showing one example of a password input screen.
FIG. 10 is a view showing one example where a list of files has been displayed.
FIG. 11 is a view showing one example of a transportation destination box list display screen.
FIG. 12 is a diagram useful in explaining one example of password inheritance.
FIGS. 13A to 13C are diagrams useful in explaining how access control information is updated when a file is copied.
FIGS. 14A to 14C are diagrams useful in explaining how access control information of boxes is updated.
FIGS. 15A to 15C are diagrams useful in explaining how access control information is updated when a file is moved.
FIG. 16 is a flowchart useful in explaining one example of the content of an access control information updating process.
FIG. 17 is a flowchart useful in explaining one example of the content of an access control information updating process when a file is moved.
FIG. 18 is a flowchart useful in explaining one example of the content of an access control information updating process when a file is copied.
FIG. 19 is a diagram showing one example of the content of property information of a file.
FIG. 20 is a flowchart useful in explaining one example of the content of an access control process.
FIG. 21 is a block diagram useful in explaining one example of the construction of an access control apparatus according to a second embodiment.
FIG. 22 is a diagram useful in explaining one example of the content of user passwords.
FIG. 23 is a diagram useful in explaining password inheritance in the second embodiment.
FIG. 24 is a diagram useful in explaining one example where the inheritance of user passwords up to priority ranking “2” has been designated.
FIG. 25 is a view showing one example of a screen for designating up to which priority ranking user passwords are to be inherited.
FIG. 26 is a diagram useful in explaining one example where only user passwords of the user who instructed an immediately preceding transportation are inherited.
FIG. 27 is a diagram useful in explaining access control according to a third embodiment.
FIG. 28 is a diagram showing one example of the content of property information in a case where access control information is added to the property information of a file.
FIG. 29 is a view showing one example of an access control information modifying screen.
FIG. 30 is a view showing one example of a screen for setting whether passwords are to be inherited.
FIG. 31 is a diagram showing one example of a screen for designating which passwords are to be inherited (or added).