Browse Definitions :
Definition

fax polling

Fax polling is a feature that allows one fax machine to send a request to another fax machine for a specific document. This process is also called fax on demand. A document can be scanned and left in the load tray, where it can be polled by another fax machine at the receiver's convenience. Both fax machines must have the polling feature to be able to complete the procedure.  If there are multiple faxes, they can be stored digitally and a list can be set in the sending machine's memory to designate which fax numbers are allowed to poll a given document. 

While the rise of internet-based documents has made e-mail a popular way to transmit documents, many companies utilize fax polling for sensitive documents. Fax polling aids in transmitting confidential information with its ability to distinguish which machines are able to receive its information, unlike e-mail or web sites which could potentially be accessed by the public.  Another benefit of fax polling is that the machine that is receiving the fax initiates the transfer, which means that the receiving machine will be charged for the transaction, not the machine which is sending the document.

Learn more about fax polling:

Comptek has more information about different types of fax transmissions.

Many all-in-one printers have fax features.  Sarah Meyers reviews the HP Photosmart Premium Fax All-in-One (AIO) printer.

This was last updated in July 2010
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close