e-ManualTopSite mapHelpGlossary

Category Top

Preventing Unauthorized Access

Increasing Security

Network Security

Key Pair and Server Certificate Settings for Encrypted SSL Communication

Generating a Key Pair and Server Certificate

Registering a Key Pair File and Server Certificate File Installed from a Computer

Editing Key Pairs and Server Certificates

Registering/Editing a CA Certificate File

Verifying Certificate Validity Using Certificate Revocation List

Network Settings/Management when Using an Advanced Box

MEAP Settings

Using the SSL

Printing Installed Application Information

Preventing Information Leakage

Digital Signatures

Setting/Confirming a Key Pair and Device Certificate

Confirming a Key Pair and User Certificate

Checking a Device Signature/User Signature Certificate

Setting a Rights Management Server

Forced Secure Watermark/Document Scan Lock

Secure Watermark (Forced Secure Watermark/Printer Driver Secure Watermark)

Adjusting the Secure Watermark Contrast

Document Scan Lock Settings

Specifying the Document Scan Lock Operational Settings
Setting the Document Scan Lock Mode
Adjusting the TL Code

Copy Set Numbering Options

Accepting Only Encrypted Secure Printing

Restricting the Send Function

Setting the Address Book

Mail Box Settings

Specifying Settings for All Mail Boxes

Specifying the Mail Box Security Settings

Setting the Control Panel Display

Managing the Setting Information Registered in the Machine

Specifying Management Settings for the Memory

Completely Erasing Unnecessary Data from the Memory

Initializing All Data/Settings

TPM Settings

Device Management

Using the USB Port

Device Information Settings

Specifying Device Information Distribution Settings

Registering/Deleting/Printing Distribution Destinations

Setting the Receiving Machine

Setting Automatic Distribution

Setting Manual Distribution

Checking/Printing the Communication Log

Limiting Functions

Remote UI

Clearing the Message Board

Saving a Log of Key Operations

Starting the Setup Guide

Retrieving Audit Logs

IEEE 2600 Security Standard

Top » Security » Specifying Management Settings for the Memory » Completely Erasing Unnecessary Data from the Memory
Completely Erasing Unnecessary Data from the Memory
0R9W-20S
You can completely erase unnecessary or previously deleted data from the memory. You can select the mode and timing for erasing data from the memory.
The following data is completely erased from the memory:
Image temporarily data created when scanning
Remaining data after the files in the Mail Box are deleted
Remaining data after the files in the Fax/I-Fax Inbox (Confidential Fax Inbox/Memory RX Inbox) are deleted
Sent and received fax/I-fax data
Spooled data
Data temporarily stored as print data
Completely Deleting Data from the Memory
1.
Press (Settings/Registration).
2.
Press [Management Settings] → [Data Management] → [Delete Existing Data Settings].
3.
Press [Delete Existing Data].
4.
Press [On] → [OK].
If you do not want to completely delete data from the memory, press [Off].
Setting the Timing of Deletion
1.
Press (Settings/Registration).
2.
Press [Management Settings] → [Data Management] → [Delete Existing Data Settings].
3.
Press [Timing of Deletion].
4.
Select the deletion timing → press [OK].
Details of each item are shown below:
[During Job]:
Overwrites and erases the data for each page as it is output.
[After Job]:
Overwrites and erases the data after all pages have been output.
Setting the Deletion Mode
You can set the Deletion mode and how many times to erase the data.
1.
Press (Settings/Registration).
2.
Press [Management Settings] → [Data Management] → [Delete Existing Data Settings].
3.
Press [Overwrite Method to Delete HDD Data] → select the deletion mode → press [OK].
Details of each item are shown below:
[Once with 0 (Null) Data]:
Overwrite the data once with 0 (null) data.
[Once with Random Data]:
Overwrite the data once with random data.
[3 Times with Random Data]:
Overwrite the data three times with random data.
[DoD Standard]:
Overwrite the data three times. The first time is with a fixed value, the second time with a complement of the fixed value, and the third time is with random data.
NOTE
As you increase the number of times the data is erased, the performance of the machine when processing jobs may degrade.

NOTE
You cannot use the machine while data is being erased from the memory. It may also take some time until the machine becomes ready to scan once the data is completely erased.
The performance of the machine may degrade when processing jobs.
Settings specified from the control panel become effective after the machine is restarted, after the procedure. If <Perform Apply Setting Changes from Settings/Regist.> is displayed on the bottom of the touch panel display, you can press [Apply Set. Chng.] in (Settings/Registration) to restart the machine. For information on restarting the machine using the main power switch, see "Main Power and Energy Saver Key."