Kyocera KM-3060 2560/3060 Operation Guide (Advanced Edition) - Page 286
Security Kit Functions, Overwriting, Instructions for General Users
View all Kyocera KM-3060 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 286 highlights
Security Instructions for General Users (for Both General Users and Administrators) Security Kit Functions The Security Kit enables overwriting and encryption. NOTE: If you install the Security Kit, the "Security functions running" message appears when the machine starts up and startup may take longer. Overwriting Multi-function printers (MFPs) temporarily store the data of scanned originals and print jobs, as well as other data stored by users, in the hard disk, and the data is output from the hard disk for printing. As the data storage area used for such data remains in the hard disk as is until it is overwritten by other data, the data stored here remains restorable by special tools for undesirable use. The Security Kit erases and overwrites (hereinafter collectively referred to as overwrite(s)) the unwanted data storage area used for the output data or deleted data so as not to be restored. No special procedures are required for overwriting, which will be automatically performed. CAUTION: Canceling a job immediately starts overwriting the data that was stored in the hard disk. Overwrite Methods There are two overwrite methods, which can be switched at any time. Once Overwrite Method Overwrite a target storage area of the hard disk (for overwriting) or entire hard disk (for system initialization) with zeroes to disable data restoration. 3-time Overwrite Method (default) Overwrite the same target storage area of the hard disk as mentioned above with a random pattern twice and then with zeroes to prevent data restoration. This method with its higher degree of security makes data restoration much more difficult than the Once Overwrite method even by a sophisticated restoration tool. This method may take more time than Once Overwrite method to process a larger amount of data. 8-2 ADVANCED OPERATION GUIDE