Konica Minolta bizhub C360 bizhub C220/C280/C360 Security Operations User Guid - Page 9

Data to be Protected

Page 9 highlights

1.3 Data to be Protected 1 1.3 Data to be Protected The underlying concept of this machine toward security is "to protect data that can be disclosed against the intention of users." The following types of image files that have been stored in the machine and made available for use by its users are protected while the machine is being used. - Image files stored by Secure Print - Image files stored as ID & Print Document when print data is to be registered using the ID & Print Setting function - Image files stored in Personal User Box, Public User Box and Group User Box The following types of data stored in the HDD are protected when use of a leased machine is terminated at the end of the leasing contract, the machine is to be discarded, or when the HDD is stolen. - Image files stored by Secure Print - Image files stored as ID & Print Document when print data is to be registered using the ID & Print Setting function - Image files stored in Personal User Box, Public User Box and Group User Box - Image files of a job in the queue - Image files other than Secure Print Document, ID & Print file and User Box file - Data files left in the data space used as image files - Temporary data files generated during print image file processing - Destination recipient data (e-mail address, telephone number) This machine offers specific functions as data protection methods: the SSL function that ensures confidentiality of images transmitted and received over the network and the S/MIME function that is used for encrypting image files. When transmitting and receiving highly confidential image data among different pieces of IT equipment within an office LAN, the machine carries out communications with the correct destination via encrypted and reliable paths, assuming an office environment that responds to most stringent security requirements. bizhub C360/C280/C220 1-5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181

bizhub C360/C280/C220
1-5
1.3
Data to be Protected
1
1.3
Data to be Protected
The underlying concept of this machine toward security is "to protect data that can be disclosed against the
intention of users."
The following types of image files that have been stored in the machine and made available for use by its
users are protected while the machine is being used.
-
Image files stored by Secure Print
-
Image files stored as ID & Print Document when print data is to be registered using the ID & Print Setting
function
-
Image files stored in Personal User Box, Public User Box and Group User Box
The following types of data stored in the HDD are protected when use of a leased machine is terminated at
the end of the leasing contract, the machine is to be discarded, or when the HDD is stolen.
-
Image files stored by Secure Print
-
Image files stored as ID & Print Document when print data is to be registered using the ID & Print Setting
function
-
Image files stored in Personal User Box, Public User Box and Group User Box
-
Image files of a job in the queue
-
Image files other than Secure Print Document, ID & Print file and User Box file
-
Data files left in the data space used as image files
-
Temporary data files generated during print image file processing
-
Destination recipient data (e-mail address, telephone number)
This machine offers specific functions as data protection methods: the SSL function that ensures confiden-
tiality of images transmitted and received over the network and the S/MIME function that is used for encrypt-
ing image files.
When transmitting and receiving highly confidential image data among different pieces of IT equipment within
an office LAN, the machine carries out communications with the correct destination via encrypted and reliable
paths, assuming an office environment that responds to most stringent security requirements.