1-5
Administrator Information
Administrator Information
Table of Contents
Introduction .................................................................................... 1-5
Security Kit Functions ................................................................... 1-8
Security Kit Installation Procedures ..........................................1-13
Hard Disk Format .........................................................................1-15
Error Messages ............................................................................ 1-16
Introduction
This operation guide contains information on the proper use of the Data
Security Kit (B) (hereinafter, Security Kit), as well as cautionary notes relating
to its use. Be sure to carefully read this operation guide before using the
Security Kit. The individual who will be responsible for operating the copier and
for copier security (hereinafter, administrator) should read this guide. The
administrator should store this guide in a secure place.
Attachments
The Security Kit comes with the following items:
• Security key (service representative will attach to copier.)
• Operation guide (this manual)
• Installation guide (for use by service representative)
About The Security Kit
The copier temporarily stores the original document, which is read as
electronic data, onto the copier’s hard disk. Printing is performed using this
data. Even after the printing is completed, the data remains stored on the hard
disk until it is overwritten by other data. Therefore, there is a possibility that
confidential information will be leaked if special tools are used to recover this
remaining data.
The Security Kit overwrites old data - data that is not required - and data
storage area where the data has been deleted to ensure that data cannot be
recovered. Overwriting is performed automatically, without user intervention.