Kyocera KM-C3232E Data Security Kit (D) Operation Guide Rev-1.0 - Page 8

Conditions Required for Data Security, Data not Secured by Overwriting, Encrypted

Page 8 highlights

Administrator Information Data not Secured by Overwriting The Security Kit secures data that is no longer required after printing or deleted. This means that the responsibility for maintaining data before it is printed or data that is stored before it is deleted lies with the user. The data derived from the following functions must be administered by the user. • Document Management (Copy Function) • Quick Copy (Printer Function) • Proof and Hold (Printer Function) • Private Print (Printer Function) • Stored Job (Printer Function) • Virtual MailBox (VMB) (Printer Function) • Temporary code Job (Printer Function) • Permanent code Job (Printer Function) • FAX Function Encrypted This machine can temporarily store scanned data on a hard disk. If the hard disk is stolen, there is a risk the data might be passed to unauthorized parties or modified. The Security Kit encrypts data stored on the hard disk, rendering it unreadable for other than normal print operations. Also, since this encryption process occurs automatically, no special operation is required. The Security Kit works on data on the machine internal hard disk but does not secure any other type of data (such as data sent to other computers). Note that data security is not guaranteed even if only one of the conditions required for data security described below is not met. Conditions Required for Data Security The followings are required for fulfilling the validity of data security using the Security Kit. Dependable Administrator A dependable administrator is required in the department to take responsibility on security on the machine using this Security Kit. 1-6

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112

1-6
Administrator Information
Data not Secured by Overwriting
The Security Kit secures data that is no longer required after printing or
deleted. This means that the responsibility for maintaining data before it is
printed or data that is stored before it is deleted lies with the user.
The data derived from the following functions must be administered by the
user.
Document Management (Copy Function)
Quick Copy (Printer Function)
Proof and Hold (Printer Function)
Private Print (Printer Function)
Stored Job (Printer Function)
Virtual MailBox (VMB) (Printer Function)
Temporary code Job (Printer Function)
Permanent code Job (Printer Function)
FAX Function
Encrypted
This machine can temporarily store scanned data on a hard disk. If the hard
disk is stolen, there is a risk the data might be passed to unauthorized parties
or modified.
The Security Kit encrypts data stored on the hard disk, rendering it unreadable
for other than normal print operations.
Also, since this encryption process occurs automatically, no special operation
is required.
The Security Kit works on data on the machine internal hard disk but does not
secure any other type of data (such as data sent to other computers). Note that
data security is not guaranteed even if only one of
the conditions required
for data security
described below is not met.
Conditions Required for Data Security
The followings are required for fulfilling the validity of data security using the
Security Kit.
Dependable Administrator
A dependable administrator is required in the department to take responsibility
on security on the machine using this Security Kit.