Panasonic DP-MB350 Digital Imaging Systems Security Solutions - Page 9

A simple add-on security solution for your existing devices

Page 9 highlights

Data Security Kit A simple "add-on" security solution for your existing devices Overview of security functions Document data that is temporarily stored on the hard disk when using the copier/printer/scanner functions is deleted immediately after completion of the operation. However, when data is deleted from the hard disk, typically only the data management information that controls access to the data is deleted. The actual data itself remains intact. As a result, the document data remains on the hard disk, and can possibly be recovered and read by a computer or a utility tool if the hard disk drive is stolen, replaced or disposed of. Document HDD Setting a password 00000 00000 HDD To protect your document data, the Data Security Kit provides the following security functions. copy/print/scan (1) Document data deletion Automatically deletes the data regions on the hard disk drive by overwriting the data when outputting the document. Two levels of overwriting security are available: Medium: Deletes all data by zeroing out all of the document's data sectors in three passes. High: Assigns random values to the document's data sectors in the first two passes, then zeroes out all the data in the third pass. Before replacing or disposing of the device, it is strongly recommended that the hard disk be initialized and that all data sectors be overwritten in such a way that the data cannot be restored. This can be done utilizing the Data Security Kit's built-in initialization function. (2) Hard disk drive lock management Setting a password for the hard disk drive helps prevent unauthorized use of the data it contains, even if the hard disk drive is removed. Attempting to use a 'locked' hard disk drive in another device without the correct password will result in the drive's data being overwritten. (3) Security setting protection Security settings on the device can only be made or changed by the key operator, and only after entering a user-defined, 8-character password. The DA-SC01 and DA-SC03 Data Security Kits have been approved as EAL2 certified system products. Common Criteria Validated EAL2 Data Security Kit DA-SC01 V1.01 and DA-SC03 V1.01 The certification obtained for this product regarding information security indicates that, as a result of evaluation based on given evaluation criteria and evaluation method, the target of evaluation used for such evaluation has been determined to conform to the security assurance requirements. What is "Common Criteria"? Common Criteria is an international standard defined as ISO15408, which is used to evaluate an information system or the hardware and software that comprises the information system, based on the targeted security assurance level. What is "EAL"? EAL stands for Evaluation Assurance Level, which indicates the strictness of the evaluation level, and not the level of security. The EAL is defined in seven levels as shown in the table on the right. Assurance Levels Level EAL 1 EAL 2 EAL 3 EAL 4 EAL 5 EAL 6 EAL 7 Outline Functionally Tested Structurally Tested Methodically Tested and Checked Methodically Designed, Tested and Reviewed Semi-formally Designed and Tested Semi-formally Verified Design and Tested Formally Verified Design and Tested

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10

Data Security Kit
Document
HDD
Setting a password
copy/print/scan
00000
00000
HDD
Common Criteria Validated EAL2
Data Security Kit DA-SC01 V1.01 and DA-SC03 V1.01
Overview of security functions
Document data that is temporarily stored on the hard disk
when using the copier/printer/scanner functions is deleted
immediately after completion of the operation. However, when
data is deleted from the hard disk, typically only the data
management information that controls access to the data is
deleted. The actual data itself remains intact. As a result, the
document data remains on the hard disk, and can possibly be
recovered and read by a computer or a utility tool if the hard
disk drive is stolen, replaced or disposed of.
To protect your document data, the
Data Security Kit
provides the following security functions.
(1) Document data deletion
Automatically deletes the data regions on the hard disk drive by overwriting
the data when outputting the document. Two levels of overwriting security are available:
Medium:
Deletes all data by zeroing out all of the document’s data sectors in three passes.
High:
Assigns random values to the document’s data sectors in the first two passes, then
zeroes out all the data in the third pass.
Before replacing or disposing of the device, it is strongly recommended that the hard disk be initialized
and that all data sectors be overwritten in such a way that the data cannot be restored. This can be
done utilizing the Data Security Kit’s built-in initialization function.
(2) Hard disk drive lock management
Setting a password for the hard disk drive helps prevent unauthorized use of the data it contains,
even if the hard disk drive is removed. Attempting to use a ‘locked’ hard disk drive in another device
without the correct password will result in the drive
s data being overwritten.
(3) Security setting protection
Security settings on the device can only be made or changed by the key operator, and only after
entering a user-defined, 8-character password.
The DA-SC01 and DA-SC03 Data Security Kits have been approved as EAL2 certified system products.
What is “Common Criteria”?
Common Criteria is an international standard defined as
ISO15408, which is used to evaluate an information
system or the hardware and software that comprises the
information system, based on the targeted security
assurance level.
What is “EAL”?
EAL stands for Evaluation Assurance Level, which indicates the
strictness of the evaluation level, and not the level of security.
The EAL is defined in seven levels as shown in the table
on the right.
Assurance Levels
EAL 1
EAL 2
EAL 3
EAL 4
EAL 5
EAL 6
EAL 7
Level
Outline
Functionally Tested
Structurally Tested
Methodically Tested and Checked
Methodically Designed, Tested and Reviewed
Semi-formally Designed and Tested
Semi-formally Verified Design and Tested
Formally Verified Design and Tested
A simple “add-on” security solution for your existing devices
The certification obtained for this product regarding information security indicates that, as a result of
evaluation based on given evaluation criteria and evaluation method, the target of evaluation used
for such evaluation has been determined to conform to the security assurance requirements.