e-ManualTopSite mapHelp

Category Top

Preventing Unauthorized Access

Increasing Security

Restricting Access by Authentication

Administrator Settings

Specifying the System Manager Settings

Department ID Management

Specifying Department ID Management

Checking/Printing/Clearing Page Totals

Accepting Jobs with Unknown Department IDs

Accepting B&W Copy and Print Jobs without Entering a Department ID

User Setting Information Management (User Setting Information Management Service)

Logging In to the User Setting Information Management Service Page

Deleting the User Setting Information

Authentication Method Settings for Sending Operations

Specifying Personal Folders

Registering Personal Folders for Each User

Setting Up the Home Folder and Personal Folders

Registering Folders Designated by Login Service as Personal Folders

Specifying Authentication Method for LDAP Server

Specifying Authentication Method for Rights Management Server

Specifying Authentication Method for SMTP Server

Specifying Authentication Method for File Server

Simple Authentication Settings for Secure Print

Setting to Disable Integrated Authentication

Network Security

Key Pair and Server Certificate Settings for Encrypted SSL Communication

Generating a Key Pair and Server Certificate

Registering a Key Pair File and Server Certificate File Installed from a Computer

Editing Key Pairs and Server Certificates

Registering/Editing a CA Certificate File

Verifying Certificate Validity Using Certificate Revocation List

Using an Encryption Method That Complies with FIPS 140-2

MEAP Settings

Using the SSL

Printing Installed Application Information

Preventing Information Leakage

Digital Signatures

Setting/Confirming a Key Pair and Device Certificate

Confirming a Key Pair and User Certificate

Checking a Device Signature/User Signature Certificate

Setting a Rights Management Server

Copy Set Numbering Options

Accepting Only Encrypted Secure Printing

Restricting the Send Function

Setting the Address Book

Mail Box Settings

Specifying Settings for All Mail Boxes

Specifying the Mail Box Security Settings

Setting the Control Panel Display

Specifying Management Settings for the Hard Disk

Completely Erasing Unnecessary Data from the Hard Disk

Initializing All Data/Settings

TPM Settings

Device Management

Using the USB Port

Device Information Settings

Specifying Device Information Delivery Settings

Registering/Deleting/Printing Delivery Destinations

Setting Automatic Delivery

Setting Manual Delivery

Setting the Receiving Machine

Checking/Printing the Communication Log

Setting SSO-H Authentication for Device Information Delivery Settings

Limiting Functions

Remote UI

Clearing the Message Board

ACCESS MANAGEMENT SYSTEM

Retrieving Audit Logs

Saving a Log of Key Operations

Available Administrator Settings Table (Touch Panel Display)

IEEE 2600 Security Standard

Top » Security » Preventing Information Leakage
Preventing Information Leakage
0L3X-25E
There are many possibilities connected to information leakage regarding documents and data handling; such as when you have left behind your original or output on the machine after you have made a copy or printed, or when a transmission error has occurred when you have tried to send your file or document.
On this machine, you can create a PDF with digital signature that verifies the data creator and that the data has not been altered.
To minimize the possibility of information leakage, this machine can be equipped with several security features, such as the Limit New Destinations mode to prevent unauthorized send and the Destination Confirmation mode to prevent transmission error.
Also, by specifying restrictions on the display of the Address Book or the Status Monitor/Cancel screen on the touch panel display of the machine, you can prevent unauthorized use of the machine or browsing by the unauthorized user.
Digital Signature
This mode displays the signature on the digital document, which indicates the source and therefore the legitimacy of the document. By using the public key encryption method, you can verify the data creator and that the data has not been altered.
The structure of a digital signature is indicated below. By comparing the encrypted data from the sender with the public key, the receiver can check the legitimacy of the sender and data. (See "Digital Signatures.")
You can create the following types of digital signature PDF on this machine.
Device Signature
User Signature
Besides the digital signature, you can create an encrypted PDF by registering a password to the PDF to prevent unauthorized browsing by a third party. (See "Encrypting PDF Files.")
Rights Management Server Settings
This machine can link with Adobe LiveCycle Rights Management to generate PDF files that have viewing and other privileges managed. For information on the settings for connecting to an Adobe LiveCycle Rights Management server, see "Setting a Rights Management Server."
For instructions on generating a PDF file using the Rights Management server, see "Applying a Policy" in Scan and Send and "Applying a Policy" in Scan and Store.
Preventing Output Information Leakage
The following modes can be set by administrator so that it is always reflected on the output by the general users.
Copy Set Numbering Extension Mode
This mode enables you to print the user name, the date and time, and custom characters in addition to the copy set number when copying/printing. By printing the copy set number and other information, you can prevent unauthorized copying by a third party. (See "Copy Set Numbering Options.")
Only Allow Encrypted Print Jobs Mode
The Encrypted Secure Print is a mode that strengthens the security by encrypting print data on a computer and decoding the encryption on the machine. This mode helps prevent the contents of your printed documents from being seen by other users and prevent leakage of confidential information. For instructions on using Secured Print and Encrypted Secure Print, see "Secure Print." For information on the optional products required to use Encrypted Secure Print, see "Optional Products Required for Each Function."
Also, you can set the machine to only receive encrypted secured print jobs from computers.
With this setting, you can prevent leaving behind or losing outputs since output is only possible when the password is entered. (See "Accepting Only Encrypted Secure Printing.")
IMPORTANT
If you are using the imagePRESS Server, you cannot use the Encrypted Secure Print Software.
Preventing Information Leakage from Sending
You can prevent information leakage that occurs during sending such as entering a wrong destination by confirming the entry of destination or restricting new destinations/domain. (See "Restricting the Send Function" and "Setting the Address Book.")
Control Panel Display Restrictions
You can restrict the browsing and the use of the Status Monitor/Cancel screen and Address Book by specifying settings for each function. (See "Setting the Control Panel Display.")