Konica Minolta bizhub C550 bizhub C451/C550 Security Operations User Manual - Page 10

Data to be Protected

Page 10 highlights

Security Chapter 1 Security 1 1.3 Data to be Protected The underlying concept of this machine toward security is "to protect data that can be disclosed against the intention of users." The following types of image files that have been stored in the machine and made available for use by its users are protected while the machine is being used. - Image files stored by Secure Print - Image files stored in Personal User Box, Public User Box and Group User Box The following types of data stored in the HDD are protected when use of a leased machine is terminated at the end of the leasing contract, the machine is to be discarded, or when the HDD is stolen. - Image files stored by Secure Print - Image files stored in Personal User Box, Public User Box and Group User Box - Image files of a job in the queue - Image files other than Secure Print file and User Box file - Data files left in the data space used as image files - Temporary data files generated during print image file processing - Destination recipient data (e-mail address, telephone number) This machine offers specific functions as data protection methods: the SSL function that ensures confidentiality of images transmitted and received over the network and the S/MIME function that is used for encrypting image files. The machine assumes an office environment that responds to most stringent security requirements by carrying out communications of highly confidential image data transmitted and received among different pieces of IT equipment within an office LAN via reliable paths and protecting such data through proper encryption. C550/C451 1-5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192

C550/C451
1-5
Security
1
Security
Chapter 1
1.3
Data to be Protected
The underlying concept of this machine toward security is "to protect data that can be disclosed against the
intention of users."
The following types of image files that have been stored in the machine and made available for use by its
users are protected while the machine is being used.
-
Image files stored by Secure Print
-
Image files stored in Personal User Box, Public User Box and Group User Box
The following types of data stored in the HDD are protected when use of a leased machine is terminated at
the end of the leasing contract, the machine is to be discarded, or when the HDD is stolen.
-
Image files stored by Secure Print
-
Image files stored in Personal User Box, Public User Box and Group User Box
-
Image files of a job in the queue
-
Image files other than Secure Print file and User Box file
-
Data files left in the data space used as image files
-
Temporary data files generated during print image file processing
-
Destination recipient data (e-mail address, telephone number)
This machine offers specific functions as data protection methods: the SSL function that ensures confiden-
tiality of images transmitted and received over the network and the S/MIME function that is used for encrypt-
ing image files.
The machine assumes an office environment that responds to most stringent security requirements by car-
rying out communications of highly confidential image data transmitted and received among different pieces
of IT equipment within an office LAN via reliable paths and protecting such data through proper encryption.