Panasonic UF-4500 Operating Instructions - Page 14

Security Suggestions for Key Operators - key operator id

Page 14 highlights

Security Suggestions for Key Operators To keep your machine's highly-sensitive document data secure, the designated Key Operators are instructed to perform the recommended security measures described below for the initial machine installation, network connection, network configuration, setup of security functions, and replacement and disposal of the machine. 1. Key Operators are required to verify the identity of the manufacturer's service technician, or of an affiliated company's staff, or marketing company, by requesting their ID Card. Do not give the device information by phone or Email. 2. Always connect through a Firewall when installing your device on a network that is connected to the Internet. When connecting this device to a client PC or a server, we recommend configuring your network environment with a switching hub to prevent your device from being wiretapped. 3. A Key Operator ID Code and Passwords is essential to maintaining the security of the device. Key Operators are required to change the ID Code and Passwords from the initial setting, and keep the ID Code and Passwords confidential and in a safe place. 4. To prevent illicit use by unauthorized personnel, perform the following for ID/password settings. 1) Use the maximum number of digits. 2) Use a variety of the accepted character types. 3) Change the ID and password periodically. Make sure that the setting screen can only be seen by the Key Operator when setting/changing various ID and passwords. Keep this information confidential. 5. Delete the data completely before transferring or destroying the device. 6. Scanned(text and images), received and set/ registered information(addresses) are your responsibility. If the device mulfunctions and the data are deleted, it cannot be recovered and is not covered in the warranty. 7. Incorrect settings may leak settings or impede use of this device. Check the details carefully when performing settings. 8. On occasion, the clock may need adjustment. (lunar inequality: 1 minute) The Key Operator plays a critical part in maintaining and controlling the security of the device and in prevention of its unauthorized access, therefore, it is of utmost importance that you understand the content described in the Operating Instructions and that you follow the suggestions herein. 14

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200

14
Security Suggestions for Key Operators
To keep your machine’s highly-sensitive document data
secure, the designated Key Operators are instructed to
perform the recommended security measures described
below for the initial machine installation, network
connection, network configuration, setup of security
functions, and replacement and disposal of the machine.
1. Key Operators are required to verify the identity of the
manufacturer’s service technician, or of an affiliated
company’s staff, or marketing company, by requesting
their ID Card.
Do not give the device information by phone or Email.
2. Always connect through a Firewall when installing your
device on a network that is connected to the Internet.
When connecting this device to a client PC or a server,
we recommend configuring your network environment
with a switching hub to prevent your device from being
wiretapped.
3. A Key Operator ID Code and Passwords is essential to
maintaining the security of the device. Key Operators are
required to change the ID Code and Passwords from the
initial setting, and keep the ID Code and Passwords
confidential and in a safe place.
4. To prevent illicit use by unauthorized personnel,
perform the following for ID/password settings.
1) Use the maximum number of digits.
2) Use a variety of the accepted character types.
3) Change the ID and password periodically.
Make sure that the setting screen can only be seen by
the Key Operator when setting/changing various ID and
passwords. Keep this information confidential.
5. Delete the data completely before transferring or
destroying the device.
6. Scanned(text and images), received and set/
registered information(addresses) are your responsibility.
If the device mulfunctions and the data are deleted, it
cannot be recovered and is not covered in the warranty.
7. Incorrect settings may leak settings or impede use of
this device. Check the details carefully when performing
settings.
8. On occasion, the clock may need adjustment. (lunar
inequality: 1 minute)
The Key Operator plays a critical part in maintaining and
controlling the security of the device and in prevention of
its unauthorized access, therefore, it is of utmost
importance that you understand the content described in
the Operating Instructions and that you follow the
suggestions herein.