Kyocera KM-C3232E Data Security Kit (D) Operation Guide Rev-1.0 - Page 7

Table of Contents, Introduction, Attachments, About The Security Kit - service manual

Page 7 highlights

Administrator Information Administrator Information Table of Contents Introduction 1-5 Security Kit Functions 1-9 Security Kit Installation Procedures 1-14 Hard Disk Format 1-17 Error Messages 1-18 Introduction This operation guide contains information on the proper use of the Data Security Kit (D) (hereinafter, Security Kit), as well as cautionary notes relating to its use. Be sure to carefully read this operation guide before using the Security Kit. This operation guide also is intended for administrators responsible for management and security of the The machine to install this Security Kit (hereinafter, the machine). The administrator should store this guide in a secure place. Attachments The Security Kit comes with the following items: • Security key (attached to the machine by the service representative) • Operation guide (this manual) • Installation guide (for use by service representative) About The Security Kit Overwriting This machine functions by temporarily storing scanned data on an internal hard disk. Printing is performed using this data. Even after the printing is completed, the data remains stored on the hard disk until it is overwritten by other data. Therefore, there is a possibility that confidential information will be leaked if special tools are used to recover this remaining data. The Security Kit overwrites old data - data that is not required - and data storage area where the data has been deleted to ensure that data cannot be recovered. Overwriting is performed automatically, without user intervention. 1-5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112

1-5
Administrator Information
Administrator Information
Table of Contents
Introduction
....................................................................................
1-5
Security Kit Functions
...................................................................
1-9
Security Kit Installation Procedures
..........................................
1-14
Hard Disk Format
.........................................................................
1-17
Error Messages
............................................................................
1-18
Introduction
This operation guide contains information on the proper use of the Data
Security Kit (D) (hereinafter, Security Kit), as well as cautionary notes relating
to its use. Be sure to carefully read this operation guide before using the
Security Kit. This operation guide also is intended for administrators
responsible for management and security of the The machine to install this
Security Kit (hereinafter, the machine). The administrator should store this
guide in a secure place.
Attachments
The Security Kit comes with the following items:
Security key (attached to the machine by the service representative)
Operation guide (this manual)
Installation guide (for use by service representative)
About The Security Kit
Overwriting
This machine functions by temporarily storing scanned data on an internal hard
disk. Printing is performed using this data. Even after the printing is completed,
the data remains stored on the hard disk until it is overwritten by other data.
Therefore, there is a possibility that confidential information will be leaked if
special tools are used to recover this remaining data.
The Security Kit overwrites old data - data that is not required - and data
storage area where the data has been deleted to ensure that data cannot be
recovered. Overwriting is performed automatically, without user intervention.