Kyocera KM-3035 Data Security Kit A Operation Guide - Page 3

English, Table of Contents, Introduction, Attachments, About The Security Kit - service manual

Page 3 highlights

1 English Table of Contents Introduction 1-1 Security Kit Functions 1-4 Security Kit Installation Procedures 1-9 Error Messages 1-12 Introduction This operation guide contains information about the proper use of the Data Security Kit (A) (hereinafter "Security Kit"), as well as cautionary notes relating to its use. Be sure to carefully read this operation guide before using the Security Kit. The individual responsible for operating the copy machine and for copy machine security (hereinafter referred to as "administrator") should also read this guide. The administrator should store this guide in a secure place. Attachments The Security Kit comes with the following items: • Security key (service personnel will attach to copy machine.) • Operation guide (this manual) • Installation guide (for use by service personnel) About The Security Kit The copy machine temporarily stores the original document read as electronic data onto an internal hard disk. Copies are made using this data. After a copy is made, the data is no longer recognized by the copy machine, yet remains stored on the copy machine's hard disk until it is overwritten by other data. Because of this process, specialized tools could be illicitly used to directly read the hard disk area and recover old data. The Security Kit overwrites old data, and rewrites the entire data storage area to ensure that data cannot be recovered. The Security Kit secures data on the copy machine's internal hard drive, but does not protect any other kind of data (data sent to the computer, etc.). Additionally, if even one of the conditions necessary for the operation of the Security Kit as described below is not met, the security of such an environment could be compromised. 1-1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76

1-1
Table of Contents
Introduction
....................................................................................
1-1
Security Kit Functions
...................................................................
1-4
Security Kit Installation Procedures
............................................
1-9
Error Messages
............................................................................
1-12
Introduction
This operation guide contains information about the proper use of the Data
Security Kit (A) (hereinafter “Security Kit”), as well as cautionary notes relating
to its use.
Be sure to carefully read this operation guide before using the
Security Kit. The individual responsible for operating the copy machine and for
copy machine security (hereinafter referred to as “administrator”) should also
read this guide. The administrator should store this guide in a secure place.
Attachments
The Security Kit comes with the following items:
Security key (service personnel will attach to copy machine.)
Operation guide (this manual)
Installation guide (for use by service personnel)
About The Security Kit
The copy machine temporarily stores the original document read as electronic
data onto an internal hard disk. Copies are made using this data. After a copy
is made, the data is no longer recognized by the copy machine, yet remains
stored on the copy machine's hard disk until it is overwritten by other data.
Because of this process, specialized tools could be illicitly used to directly read
the hard disk area and recover old data. The Security Kit overwrites old data,
and rewrites the entire data storage area to ensure that data cannot be
recovered.
The Security Kit secures data on the copy machine’s internal hard drive, but
does not protect any other kind of data (data sent to the computer, etc.).
Additionally, if even one of the conditions necessary for the operation of the
Security Kit as described below is not met, the security of such an environment
could be compromised.
1
English