Ricoh Aficio MP C3002 Security Target - Page 5

Residual Data Overwrite Function

Page 5 highlights

Page 4 of 93 7.3 Document Access Control Function 84 7.4 Use-of-Feature Restriction Function 87 7.5 Network Protection Function 87 7.6 Residual Data Overwrite Function 88 7.7 Stored Data Protection Function 88 7.8 Security Management Function 89 7.9 Software Verification Function 93 7.10 Fax Line Separation Function 93 Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94

Page 4 of
93
Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.
7.3
7.3
7.3
7.3
Document Access Control Function
Document Access Control Function
Document Access Control Function
Document Access Control Function
................................
................................
................................
................................................................
................................
................................
.............................................
.............
.............
.............
84
84
84
84
7.4
7.4
7.4
7.4
Use
Use
Use
Use-of
of
of
of-Feature Restriction Function
Feature Restriction Function
Feature Restriction Function
Feature Restriction Function
................................
................................
................................
................................................................
................................
................................
...........................................
...........
...........
...........
87
87
87
87
7.5
7.5
7.5
7.5
Network Protection Function
Network Protection Function
Network Protection Function
Network Protection Function
................................
................................
................................
................................................................
................................
................................
.......................................................
.......................
.......................
.......................
87
87
87
87
7.6
7.6
7.6
7.6
Residual Data Overwrite Func
Residual Data Overwrite Func
Residual Data Overwrite Func
Residual Data Overwrite Function
tion
tion
tion
................................
................................
................................
................................................................
................................
................................
..............................................
..............
..............
..............
88
88
88
88
7.7
7.7
7.7
7.7
Stored Data Protection Function
Stored Data Protection Function
Stored Data Protection Function
Stored Data Protection Function
................................
................................
................................
................................................................
................................
................................
.................................................
.................
.................
.................
88
88
88
88
7.8
7.8
7.8
7.8
Security Management Function
Security Management Function
Security Management Function
Security Management Function
................................
................................
................................
................................................................
................................
................................
..................................................
..................
..................
..................
89
89
89
89
7.9
7.9
7.9
7.9
Software Verification Function
Software Verification Function
Software Verification Function
Software Verification Function
................................
................................
................................
................................................................
................................
................................
....................................................
....................
....................
....................
93
93
93
93
7.10
7.10
7.10
7.10
Fax Line Separation Function
Fax Line Separation Function
Fax Line Separation Function
Fax Line Separation Function
................................
................................
................................
................................................................
................................
................................
.....................................................
.....................
.....................
.....................
93
93
93
93