Konica Minolta bizhub C360 bizhub C220/C280/C360 PKI Security Operations User - Page 5

Overview, Compliance with the ISO15408 standard, Data to be protected, Precautions for operation - user manual

Page 5 highlights

bizhub C360/C280/C220 for PKI Card System Security Function Security Function Ver. 1.02 Jul. 2010 1. Overview 1. Overview This Service Manual contains the essential operating procedures and precautions for using the security functions. 2. Compliance with the ISO15408 standard The security functions offered by this machine comply with ISO15408/IEC15408 (level: EAL3). 3. Data to be protected TThe underlying concept of this machine toward security is "to protect data that can be disclosed against the intention of users." The following types of image files that have been saved in the machine and made available for use by its users are protected while the machine is being used. • Encrypted document transmitted to the machine using a dedicated printer driver and an IC card from the client PC and saved in the machine • Image files which have been scanned for transmission to a user mail address through email (S/MIME) The following types of data saved in the HDD are protected when use of a leased machine is terminated at the end of the leasing contract, the machine is to be discarded, or when the HDD is stolen. • Encrypted document • Scanned image files • Image files other than Encrypted document • Image files of a job in the queue state other than Scanned image files • Data files left in the HDD data space, used as image files and not deleted through the general deletion operation • Temporary data files generated during print image file processing 4. Precautions for operation control A. Requirements of the service engineer The service engineer should take full responsibility for controlling the machine during his or her procedures for setting up and servicing the machine so that no improper operations are performed. • The service engineer who sets up and services the machine should have completed the course in security and be certified accordingly. • The service engineer should swear that he or she would never disclose information as it relates to the settings of this machine to anybody in accordance with the Installation Checklist contained in User's Guide [Security Operations]. • The service engineer should perform his or her physical service jobs in the presence of the administrator of the machine. 1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41

Security Function Ver. 1.02 Jul. 2010
1. Overview
1
bizhub C360/C280/C220
for PKI Card System
Security Function
1.
Overview
This Service Manual contains the essential operating procedures and precautions for using
the security functions.
2.
Compliance with the ISO15408 standard
The security functions offered by this machine comply with ISO15408/IEC15408 (level:
EAL3).
3.
Data to be protected
TThe underlying concept of this machine toward security is “to protect data that can be dis-
closed against the intention of users.”
The following types of image files that have been saved in the machine and made available
for use by its users are protected while the machine is being used.
Encrypted document transmitted to the machine using a dedicated printer driver and an
IC card from the client PC and saved in the machine
Image files which have been scanned for transmission to a user mail address through
email (S/MIME)
The following types of data saved in the HDD are protected when use of a leased machine
is terminated at the end of the leasing contract, the machine is to be discarded, or when the
HDD is stolen.
Encrypted document
Scanned image files
Image files other than Encrypted document
Image files of a job in the queue state other than Scanned image files
Data files left in the HDD data space, used as image files and not deleted through the
general deletion operation
Temporary data files generated during print image file processing
4.
Precautions for operation control
A.
Requirements of the service engineer
The service engineer should take full responsibility for controlling the machine during his or
her procedures for setting up and servicing the machine so that no improper operations are
performed.
<To achieve effective security>
The service engineer who sets up and services the machine should have completed the
course in security and be certified accordingly.
The service engineer should swear that he or she would never disclose information as it
relates to the settings of this machine to anybody in accordance with the Installation
Checklist contained in User’s Guide [Security Operations].
The service engineer should perform his or her physical service jobs in the presence of
the administrator of the machine.