Konica Minolta bizhub 950i bizhub 950i/850i Security Operations User Guide - Page 16
Precautions for operation control
View all Konica Minolta bizhub 950i manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 16 highlights
1.5 Precautions for operation control 1 1.5 Precautions for operation control This machine and the data handled by this machine should be used in an office environment that meets the following conditions. The machine must be controlled for its operation under the following conditions to protect the data that should be protected. 1.5.1 Roles of the owner of the machine NOTICE An improper administrator may weaken and invalidate the security function. Besides, to maintain the security for users who are to use the machine, the following actions must be taken. The owner (an individual or an organization) of the machine should take full responsibility for controlling the machine, thereby ensuring that no improper operations are performed. - The owner of the machine should have the administrator recognize the organizational security policy and procedure, educate him or her to comply with the guidance and documents prepared by the manufacturer, and allow time for him or her to acquire required ability. The owner of the machine should also operate and manage the machine so that the administrator can configure and operate the machine appropriately according to the policy and procedure. If the administrator does not or cannot follow the policy and procedure, the security function of this machine cannot be maintained. - The owner of the machine should have users of the machine recognize the organizational security policy and procedure, educate them to follow the policy and procedure, and operate and manage the machine so that the users acquire the required ability. If the ability is insufficient, the administrator may not be able to protect user's personal information, and a secure operation of the machine cannot be maintained. - The owner of the machine should vest the user with authority to use the machine according to the organizational security policy and procedure. The owner of the machine must carry out it to prevent security information from being leaked by users. - The owner of the machine should select a trustworthy person as an administrator who has sufficient knowledge, technology, and experience to maintain the security of the machine and can take proper actions when trouble occurs, then ask he/she to control the machine. - The owner of the machine should operate and manage the machine so that the administrator checks the job log (audit log) data at appropriate timing to thereby determine whether a security compromise or a faulty condition has occurred during an operating period. Proper management makes it possible to prevent trouble from occurring, or take prompt actions soon after a trouble occurs. - The owner of the machine must permit only the administrator to handle the job log (audit log) data that has automatically been distributed. The owner of the machine should also operate and manage the machine such that the job log (audit log) data is not illegally accessed, deleted, or altered. Critical information may be leaked unintentionally. 1.5.2 Maintenance of the security environment The owner of the machine should use the Enhanced Security Mode and maintain the operating environment as follows. - The client PC for operating the machine should be used in a secure state where the latest published update program is used for the OS and applications (such a virus software, printer driver, browser, and etc.). - Connect the machine to the internal network which is protected by the firewall to prohibit any access from the external network to the machine. Furthermore, control the machine to prevent the internal network from being accessed by illegal devices. NOTICE If the machine is connected to an internal network which is not protected by the firewall, the machine may be attacked from the external network. bizhub 950i/850i/AccurioPrint 950i/850i 1-12