Authentication/Security Settings
267
Tools
5
The manager (of the organization that this machine is used for) must follow the instructions
below:
z
Assign an appropriate person as a system administrator and manage and train the person
properly.
z
When turning off the machine, make sure no operation is running. Train the users to turn off
the machine after an active operation completes, if any.
z
Note that the Data Security Feature is used to protect deleted document data from being
recovered; it does not protect files stored in folders in the hard disk.
z
Install an anti-bugging device on the internal network that the machine with the Data Security
Feature is located on, and perform the network settings properly to protect the machine from
interceptions.
z
To block unauthorized access, install a firewall device between the external network and the
internal network that the machine is located on.
z
Set the passcode and encryption key according to the following rules:
- Do not use easily assured character string
- Use both characters and numerics
For more information on encryption key, refer to "Encryption Key for Confidential Data" (P.154).