e-ManualTopSite mapHelpGlossary

Category Top

Preventing Unauthorized Access

Increasing Security

Network Security

Key Pair and Server Certificate Settings for Encrypted SSL Communication

Generating a Key Pair and Server Certificate

Registering a Key Pair File and Server Certificate File Installed from a Computer

Editing Key Pairs and Server Certificates

Registering/Editing a CA Certificate File

Verifying Certificate Validity Using Certificate Revocation List

Network Settings/Management when Using an Advanced Box

MEAP Settings

Using the SSL

Printing Installed Application Information

Preventing Information Leakage

Digital Signatures

Setting/Confirming a Key Pair and Device Certificate

Confirming a Key Pair and User Certificate

Checking a Device Signature/User Signature Certificate

Setting a Rights Management Server

Forced Secure Watermark/Document Scan Lock

Secure Watermark (Forced Secure Watermark/Printer Driver Secure Watermark)

Adjusting the Secure Watermark Contrast

Document Scan Lock Settings

Specifying the Document Scan Lock Operational Settings
Setting the Document Scan Lock Mode
Adjusting the TL Code

Copy Set Numbering Options

Accepting Only Encrypted Secure Printing

Restricting the Send Function

Setting the Address Book

Mail Box Settings

Specifying Settings for All Mail Boxes

Specifying the Mail Box Security Settings

Setting the Control Panel Display

Managing the Setting Information Registered in the Machine

Specifying Management Settings for the Memory

Completely Erasing Unnecessary Data from the Memory

Initializing All Data/Settings

TPM Settings

Device Management

Using the USB Port

Device Information Settings

Specifying Device Information Distribution Settings

Registering/Deleting/Printing Distribution Destinations

Setting the Receiving Machine

Setting Automatic Distribution

Setting Manual Distribution

Checking/Printing the Communication Log

Limiting Functions

Remote UI

Clearing the Message Board

Saving a Log of Key Operations

Starting the Setup Guide

Retrieving Audit Logs

IEEE 2600 Security Standard

Top » Security » Specifying Management Settings for the Memory
Specifying Management Settings for the Memory
0R9W-20R
The memory of the machine stores registered information for the Address Book and password information, in addition to document data for functions such as Fax. Therefore, it is necessary to manage the data in the memory with strong security measures.
With the machine equipped with functions such as data encryption and data erase, you can manage the data and prevent information leakage to retain security and confidentiality.
IMPORTANT
The security provided by TPM does not guarantee complete protection of the data and hardware. Note that Canon will not be liable for any failure or damages resulting from the use of this mode.

Memory Data Erase
The machine separates and stores the job data when copying, sending, receiving, and printing into management information and actual data. The management information is automatically erased when the job is complete, but the actual data is stored in the memory.
With this function, you can completely erase all of the actual data in the memory of the machine by overwriting with 0 data or random data. This is effective in preventing data leakage when replacing or disposing the memory. For more information, see "Completely Erasing Unnecessary Data from the Memory."
Initializing Stored Files and Registered Information
You can erase (initialize) data stored in the machine such as stored files, registered information of the Address Book, and job history. (See "Initializing All Data/Settings.")
HDD Data Encryption
For information on the optional products required to use this function, see "Optional Products Required for Each Function."
You can encrypt data stored in the memory such as registered information in the Address Book, job data, and password information, preventing confidential information leakage from the memory. For more information, see the manual for the HDD Data Encryption Kit.
TPM Settings
You can encrypt the password and certificate information managed in the memory using the TPM Settings mode. (See "TPM Settings.")