Print Controller Design Guide for Information Security
Page 4 of 86
2-4-2 Data Security Considerations ............................................................................... 60
2-4-3 Protection of the Journal and Documents in Document Server Storage ............... 61
2-4-4 Protection of FAX Transmission Operations ......................................................... 61
2-4-5 Protection of FAX Features Settings..................................................................... 62
2-4-6 The “Extended Security” Feature.......................................................................... 62
2-4-7 Job Log................................................................................................................. 62
2-4-8 Protection of Internet FAX Transmissions using S/MIME...................................... 62
2-4-9 Preventing FAX Transmission to Unintended Destination(s)................................. 63
2-5 NetFile (GWWS) ...................................................................................................... 64
2-5-1 Overview of NetFile Operations ............................................................................ 64
2-5-2 Data Flow.............................................................................................................. 65
2-5-3 Supplementary...................................................................................................... 65
2-5-4 Data Security Considerations ............................................................................... 67
2-6 Web Applications ..................................................................................................... 69
2-6-1 Web Server Framework ........................................................................................ 69
2-6-2 WebDocBox (MFP models only)........................................................................... 70
3. Optional Features......................................................................................................... 73
3-1 @Remote................................................................................................................. 73
3-1-1 Overview of @Remote Operations ....................................................................... 73
3-1-2 Data Security Considerations ............................................................................... 73
3-2 The “Copy Data Security” Feature ........................................................................... 74
3-2-1 Overview of Copy Data Security Operations......................................................... 74
3-2-2 Data Flow.............................................................................................................. 75
4. Device SDK Applications (DSDK) ................................................................................ 77
4-1 Overview of Operations............................................................................................ 77
4-1-1 Installation............................................................................................................. 78
4-1-2 Overview of SDK Application Functions................................................................ 79
4-2 Data Flow................................................................................................................. 80
4-2-1 Scanning Functions: Sending Data Over the Network with the Copier and Scanner