Document security > 5
D
OCUMENT
SECURITY
Document security can be breached in many ways. Some are obvious and can be remedied
quite easily;
> Unattended documents left in a printer’s output tray. Even one connected “one-to-
one” with a computer.
> Worse still, unattended documents left in a networked printer’s output tray, for all to
see!
> Personnel possessing confidential documents off-site.
Other security risks may not be so obvious.
As printers and multi-function products become more sophisticated so must the security
measures to ensure your valuable data is kept secure.
If left unprotected, access to records can be achieved via a networked machine. On-board
storage devices may contain confidential data such as PIN numbers, personnel names and
IP addresses as well as raw text.
Your machine has a number of valuable features which, when enabled, reduce the risk of
security breaches.
The following chapters guide you through the initial set up and also explain how you use
the secure printing features.
G
LOSSARY
IP Internet Protocol
MAC Address Media Access Control Address
PIN Personal Identification Number
SSL Secure Sockets Layer
TLS Transport Layer Security
Storage device Hard disk drive (HDD) or SD card