Konica Minolta 920 All in One Printer User Manual


 
Enhanced Security Mode
2
bizhub PRO 920 3
2 Enhanced Security Mode
2.1 Description of Enhanced Security mode
The following items will have enhanced security.
- Protect and delete used data in memory and on the HDD
There are two kinds of image data that will be saved in memory and on
the HDD: AHA compressed data and uncompressed data (TIFF and PDF
formats). Memory and HDD areas containing the AHA compressed data
is freed up when data is deleted. However in normal mode data is not
completely deleted so it could be read through illicit means. In the En-
hanced Security mode, data will be completely cleared before freeing up
image areas.
Regardless of the data type (compressed or uncompressed), the image
area in memory and on the HDD where the data has been saved will be
freed up after it is completely overwritten by the data disrelated to the im-
age data.
- Enhanced password
The password is made up of 8 to 64 alphanumerical characters (case
sensitive).
If a wrong password is entered, attempts to re-try cannot be made for five
seconds.
- Machine NIC setting
When the Enhanced Security mode is ON, the Machine NIC cannot be
used.
- Access to the Box with a password
Set up a system that requires users to input an enhanced password as
described above, to save data or to print data saved in the Box on the
HDD.
If an enhanced password is set up as above, security will be improved
when saving scanned data in the Box. No one other than the machine
manager can delete the Box or Personal Folder in which scanned data is
saved, and changing the Box’s attributes requires authentication with the
enhanced password. In addition, authentication will be required to use
scanned data saved in the Box.
- External access prohibited
No access is allowed over telephone lines other than CS Remote Care.
- Create, save and analyze an audit log
A history of security function operations will be created and saved. Date
and time, information identifying the person who made the operation, de-
tails of the operation, and results of the operation will be saved, enabling
analysis of unauthorized access. This log will be overwritten if the audit
area is depleted.