Konica Minolta bizhub 950i bizhub 950i/850i Security Operations User Guide - Page 16

Precautions for operation control

Page 16 highlights

1.5 Precautions for operation control 1 1.5 Precautions for operation control This machine and the data handled by this machine should be used in an office environment that meets the following conditions. The machine must be controlled for its operation under the following conditions to protect the data that should be protected. 1.5.1 Roles of the owner of the machine NOTICE An improper administrator may weaken and invalidate the security function. Besides, to maintain the security for users who are to use the machine, the following actions must be taken. The owner (an individual or an organization) of the machine should take full responsibility for controlling the machine, thereby ensuring that no improper operations are performed. - The owner of the machine should have the administrator recognize the organizational security policy and procedure, educate him or her to comply with the guidance and documents prepared by the manufacturer, and allow time for him or her to acquire required ability. The owner of the machine should also operate and manage the machine so that the administrator can configure and operate the machine appropriately according to the policy and procedure. If the administrator does not or cannot follow the policy and procedure, the security function of this machine cannot be maintained. - The owner of the machine should have users of the machine recognize the organizational security policy and procedure, educate them to follow the policy and procedure, and operate and manage the machine so that the users acquire the required ability. If the ability is insufficient, the administrator may not be able to protect user's personal information, and a secure operation of the machine cannot be maintained. - The owner of the machine should vest the user with authority to use the machine according to the organizational security policy and procedure. The owner of the machine must carry out it to prevent security information from being leaked by users. - The owner of the machine should select a trustworthy person as an administrator who has sufficient knowledge, technology, and experience to maintain the security of the machine and can take proper actions when trouble occurs, then ask he/she to control the machine. - The owner of the machine should operate and manage the machine so that the administrator checks the job log (audit log) data at appropriate timing to thereby determine whether a security compromise or a faulty condition has occurred during an operating period. Proper management makes it possible to prevent trouble from occurring, or take prompt actions soon after a trouble occurs. - The owner of the machine must permit only the administrator to handle the job log (audit log) data that has automatically been distributed. The owner of the machine should also operate and manage the machine such that the job log (audit log) data is not illegally accessed, deleted, or altered. Critical information may be leaked unintentionally. 1.5.2 Maintenance of the security environment The owner of the machine should use the Enhanced Security Mode and maintain the operating environment as follows. - The client PC for operating the machine should be used in a secure state where the latest published update program is used for the OS and applications (such a virus software, printer driver, browser, and etc.). - Connect the machine to the internal network which is protected by the firewall to prohibit any access from the external network to the machine. Furthermore, control the machine to prevent the internal network from being accessed by illegal devices. NOTICE If the machine is connected to an internal network which is not protected by the firewall, the machine may be attacked from the external network. bizhub 950i/850i/AccurioPrint 950i/850i 1-12

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108

bizhub 950i/850i/AccurioPrint 950i/850i
1-12
1.5
Precautions for operation control
1
1.5
Precautions for operation control
This machine and the data handled by this machine should be used in an office environment that meets the
following conditions. The machine must be controlled for its operation under the following conditions to pro-
tect the data that should be protected.
1.5.1
Roles of the owner of the machine
NOTICE
An improper administrator may weaken and invalidate the security function. Besides, to maintain the security
for users who are to use the machine, the following actions must be taken.
The owner (an individual or an organization) of the machine should take full responsibility for controlling the
machine, thereby ensuring that no improper operations are performed.
-
The owner of the machine should have the administrator recognize the organizational security policy
and procedure, educate him or her to comply with the guidance and documents prepared by the man-
ufacturer, and allow time for him or her to acquire required ability. The owner of the machine should
also operate and manage the machine so that the administrator can configure and operate the machine
appropriately according to the policy and procedure. If the administrator does not or cannot follow the
policy and procedure, the security function of this machine cannot be maintained.
-
The owner of the machine should have users of the machine recognize the organizational security policy
and procedure, educate them to follow the policy and procedure, and operate and manage the machine
so that the users acquire the required ability. If the ability is insufficient, the administrator may not be
able to protect user's personal information, and a secure operation of the machine cannot be main-
tained.
-
The owner of the machine should vest the user with authority to use the machine according to the or-
ganizational security policy and procedure. The owner of the machine must carry out it to prevent se-
curity information from being leaked by users.
-
The owner of the machine should select a trustworthy person as an administrator who has sufficient
knowledge, technology, and experience to maintain the security of the machine and can take proper
actions when trouble occurs, then ask he/she to control the machine.
-
The owner of the machine should operate and manage the machine so that the administrator checks
the job log (audit log) data at appropriate timing to thereby determine whether a security compromise
or a faulty condition has occurred during an operating period. Proper management makes it possible
to prevent trouble from occurring, or take prompt actions soon after a trouble occurs.
-
The owner of the machine must permit only the administrator to handle the job log (audit log) data that
has automatically been distributed. The owner of the machine should also operate and manage the ma-
chine such that the job log (audit log) data is not illegally accessed, deleted, or altered. Critical informa-
tion may be leaked unintentionally.
1.5.2
Maintenance of the security environment
The owner of the machine should use the Enhanced Security Mode and maintain the operating environment
as follows.
-
The client PC for operating the machine should be used in a secure state where the latest published
update program is used for the OS and applications (such a virus software, printer driver, browser, and
etc.).
-
Connect the machine to the internal network which is protected by the firewall to prohibit any access
from the external network to the machine. Furthermore, control the machine to prevent the internal net-
work from being accessed by illegal devices.
NOTICE
If the machine is connected to an internal network which is not protected by the firewall, the machine may be
attacked from the external network.