,))<',%2+)3*(-+-8%0(3'91)287-28,)
78')2896='6)%8)72);',%00)2+)7*36
2)8;36/7)'96-8=,%64,%7():)034)(%2
%;%6(;-22-2+1908-0%=)6)(7)'96-8=
7=78)183,)044638)'8:%09%&0)
-2*361%8-32%2(1%-28%-2)1403=))
'32*-()28-%0-8=,%64,%7%032+,-7836=
-21%-28%-2-2+(-+-8%07)'96-8=A73
'36436%8))2(97)67%2(
463*)77-32%07'%2'3928328,)463:)2
7%*)+9%6(73*8,)"
!
Authority Group and Access Control
Advanced account management enables
administrators to set authority groups for access
to features of the MX-C312. Administrators can
control which department, for instance, has full
access to color copying, printing, scanning and/or
fax. Walk up users enter a code, Local Name and
Password, or LDAP User Authentication to access
their features assigned to their group. Users can also
login utilizing a human interface device (HID) such as
a Smartcard or Common Access Card (CAC).*
Data Erase and Encryption
To help protect your data, the MX-C312 Series offers an
optional data security kit that encrypts document data
using AES (Advanced Encryption Standard) encryption.
Additionally, the data security kit erases the temporary
memory on the hard drive by overwriting the encrypted
data up to seven times, offering an unprecedented level
of assurance.
Control Device Access Over the Network
To help restrict access to the device over the network,
the MX-C312 offers IPsec, SMB and extended support
for SSL Encryption (Secure Sockets Layer), IP/MAC
address filtering, IEEE 802.1x authentication,
protocol enable/disable and port management
for maximum security.
Network Scanning Access
To help protect your network from unauthorized
E-mail communications, the MX-C312 supports
User Authentication, requiring users to login
before performing any network scanning operations.
Documents Remain Confidential
To help protect your printed documents from
unauthorized viewing, the MX-C312 offers encrypted PDF
files for printing and scanning as well as Confidential
Printing that requires users to enter a PIN code in
order to print a queued document. Additionally, Secure
Fax Release ensures received fax documents are held
in memory until an authorized user enters a PIN code.
So compliance with healthcare regulations such as
HIPAA is easier.
6%'/-2+%2(9(-8-2+2*361%8-32
Legislation and industry policies require companies
to be more aware of information flow from their
offices. Sharp offers both built-in and additional
hardware/software which allows users to control,
access and track usage of each device on
the network.
These scalable security offerings aim to protect
your intellectual property, preserve confidential
information and help your business to meet regulatory
requirements, such as the Health Insurance
Portability and Accountability Act (HIPAA), and the
Gramm-Leach-Bliley Act (GLB). For additional
information visit: www.sharpusa.com/security
* Some features require optional equipment.