Ricoh Aficio SP C820DN Design Guide - Page 3

Protection of Data when Performing Scanning and Sending Operations - printer

Page 3 highlights

Print Controller Design Guide for Information Security 1-9-3 Capture Settings 41 1-9-4 Security Considerations 42 1-9-5 Captured Documents and Log Data 42 1-10 Additional Methods for Increased Security 42 2. Principal Machine Functions 43 2-1 Copier (MFP Models Only 43 2-1-1 Overview of Copier Operations 43 2-1-2 Data Security Considerations 43 2-1-3 Protection of Copy Jobs in Progress 43 2-1-4 Protection of Document Server Documents 43 2-1-5 Protection of Copier/Document Server Features 45 2-1-6 Restricting the Available Functions for Each Individual User 45 2-1-7 Job/Access Log Data Collection 45 2-1-8 Print Backup ...45 2-2 Printer ...47 2-2-1 Overview of Printer Operations 47 2-2-2 Data Flow...47 2-2-3 Data Security Considerations 51 2-3 Scanner (MFP Models Only 54 2-3-1 Overview of Scanner Operations 54 2-3-2 Data Flow Security Considerations 54 2-3-3 Protection of Data when Performing Scanning and Sending Operations 55 2-3-4 Protection of Document Server Documents 56 2-3-5 Protection of Sending Results and Status Information 57 2-3-6 Protection of the Scanner Features Settings 57 2-3-7 Data Stored in the Job Log 58 2-3-8 Terminology ...58 2-4 FAX (MFP Models Only 59 2-4-1 Overview of FAX operations 59 Page 3 of 86

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86

Print Controller Design Guide for Information Security
Page 3 of 86
1-9-3
Capture Settings
...................................................................................................
41
1-9-4
Security Considerations
........................................................................................
42
1-9-5
Captured Documents and Log Data
......................................................................
42
1-10
Additional Methods for Increased Security
...............................................................
42
2.
Principal Machine Functions
........................................................................................
43
2-1
Copier (MFP Models Only)
.......................................................................................
43
2-1-1
Overview of Copier Operations
.............................................................................
43
2-1-2
Data Security Considerations
...............................................................................
43
2-1-3
Protection of Copy Jobs in Progress
.....................................................................
43
2-1-4
Protection of Document Server Documents
..........................................................
43
2-1-5
Protection of Copier/Document Server Features
..................................................
45
2-1-6
Restricting the Available Functions for Each Individual User
................................
45
2-1-7
Job/Access Log Data Collection
...........................................................................
45
2-1-8
Print Backup
.........................................................................................................
45
2-2
Printer
......................................................................................................................
47
2-2-1
Overview of Printer Operations
.............................................................................
47
2-2-2
Data Flow
..............................................................................................................
47
2-2-3
Data Security Considerations
...............................................................................
51
2-3
Scanner (MFP Models Only)
....................................................................................
54
2-3-1
Overview of Scanner Operations
..........................................................................
54
2-3-2
Data Flow Security Considerations
.......................................................................
54
2-3-3
Protection of Data when Performing Scanning and Sending Operations
..............
55
2-3-4
Protection of Document Server Documents
..........................................................
56
2-3-5
Protection of Sending Results and Status Information
..........................................
57
2-3-6
Protection of the Scanner Features Settings
........................................................
57
2-3-7
Data Stored in the Job Log
...................................................................................
58
2-3-8
Terminology
..........................................................................................................
58
2-4
FAX (MFP Models Only)
..........................................................................................
59
2-4-1
Overview of FAX operations
.................................................................................
59