Kyocera KM-C3232E Data Security Kit (D) Operation Guide Rev-1.0 - Page 3

English, Table of Contents, Introduction, About The Security Kit, General User Information

Page 3 highlights

1 English General User Information General User Information Table of Contents Introduction 1-1 Introduction This operation guide contains information on the proper use of the Data Security Kit (D) (hereinafter, Security Kit), as well as cautionary notes relating to its use. Be sure to carefully read this operation guide before using the Security Kit. About The Security Kit Overwriting The machine to install this Security Kit (hereinafter, the machine) functions by temporarily storing scanned data on an internal hard disk. Printing is performed using this data. Even after the printing is completed, the data remains stored on the hard disk until it is overwritten by other data. Therefore, there is a possibility that confidential information will be leaked if special tools are used to recover this remaining data. The Security Kit overwrites old data - data that is not required - and data storage area where the data has been deleted to ensure that data cannot be recovered. Overwriting is performed automatically, without user intervention. Data not Secured by Overwriting The Security Kit secures data that is no longer required after printing or deleted. This means that the responsibility for maintaining data before it is printed or data that is stored before it is deleted lies with the user. 1-1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112

1-1
General User Information
General User Information
Table of Contents
Introduction
....................................................................................
1-1
Introduction
This operation guide contains information on the proper use of the Data
Security Kit (D) (hereinafter, Security Kit), as well as cautionary notes relating
to its use. Be sure to carefully read this operation guide before using the
Security Kit.
About The Security Kit
Overwriting
The machine to install this Security Kit (hereinafter, the machine) functions by
temporarily storing scanned data on an internal hard disk. Printing is performed
using this data. Even after the printing is completed, the data remains stored
on the hard disk until it is overwritten by other data. Therefore, there is a
possibility that confidential information will be leaked if special tools are used to
recover this remaining data.
The Security Kit overwrites old data - data that is not required - and data
storage area where the data has been deleted to ensure that data cannot be
recovered. Overwriting is performed automatically, without user intervention.
Data not Secured by Overwriting
The Security Kit secures data that is no longer required after printing or
deleted. This means that the responsibility for maintaining data before it is
printed or data that is stored before it is deleted lies with the user.
1
English