Ricoh C400DN Security Target - Page 5

Residual Data Overwrite Function

Page 5 highlights

Page 4 of 91 7.3 Document Access Control Function 82 7.4 Use-of-Feature Restriction Function 84 7.5 Network Protection Function 85 7.6 Residual Data Overwrite Function 85 7.7 Stored Data Protection Function 86 7.8 Security Management Function 86 7.9 Software Verification Function 91 7.10 Fax Line Separation Function 91 Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92

Page 4 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.
7.3
7.3
7.3
7.3
Document Access Control Function
Document Access Control Function
Document Access Control Function
Document Access Control Function
................................
................................
................................
................................................................
................................
................................
.............................................
.............
.............
.............
82
82
82
82
7.4
7.4
7.4
7.4
Use
Use
Use
Use-of
of
of
of-Feature Restriction Function
Feature Restriction Function
Feature Restriction Function
Feature Restriction Function
................................
................................
................................
................................................................
................................
................................
...........................................
...........
...........
...........
84
84
84
84
7.5
7.5
7.5
7.5
Network Protection Function
Network Protection Function
Network Protection Function
Network Protection Function
................................
................................
................................
................................................................
................................
................................
.......................................................
.......................
.......................
.......................
85
85
85
85
7.6
7.6
7.6
7.6
Residual Data Ov
Residual Data Ov
Residual Data Ov
Residual Data Overwrite Function
erwrite Function
erwrite Function
erwrite Function
................................
................................
................................
................................................................
................................
................................
..............................................
..............
..............
..............
85
85
85
85
7.7
7.7
7.7
7.7
Stored Data Protection Function
Stored Data Protection Function
Stored Data Protection Function
Stored Data Protection Function
................................
................................
................................
................................................................
................................
................................
.................................................
.................
.................
.................
86
86
86
86
7.8
7.8
7.8
7.8
Security Management Function
Security Management Function
Security Management Function
Security Management Function
................................
................................
................................
................................................................
................................
................................
..................................................
..................
..................
..................
86
86
86
86
7.9
7.9
7.9
7.9
Software Verification Function
Software Verification Function
Software Verification Function
Software Verification Function
................................
................................
................................
................................................................
................................
................................
....................................................
....................
....................
....................
91
91
91
91
7.10
7.10
7.10
7.10
Fax Line Separation Function
Fax Line Separation Function
Fax Line Separation Function
Fax Line Separation Function
................................
................................
................................
................................................................
................................
................................
.....................................................
.....................
.....................
.....................
91
91
91
91