Print Controller Design Guide for Information Security
Page 3 of 86
1-9-3 Capture Settings ................................................................................................... 41
1-9-4 Security Considerations........................................................................................ 42
1-9-5 Captured Documents and Log Data...................................................................... 42
1-10 Additional Methods for Increased Security............................................................... 42
2. Principal Machine Functions ........................................................................................ 43
2-1 Copier (MFP Models Only)....................................................................................... 43
2-1-1 Overview of Copier Operations............................................................................. 43
2-1-2 Data Security Considerations ............................................................................... 43
2-1-3 Protection of Copy Jobs in Progress..................................................................... 43
2-1-4 Protection of Document Server Documents.......................................................... 43
2-1-5 Protection of Copier/Document Server Features .................................................. 45
2-1-6 Restricting the Available Functions for Each Individual User ................................ 45
2-1-7 Job/Access Log Data Collection ........................................................................... 45
2-1-8 Print Backup ......................................................................................................... 45
2-2 Printer ...................................................................................................................... 47
2-2-1 Overview of Printer Operations............................................................................. 47
2-2-2 Data Flow.............................................................................................................. 47
2-2-3 Data Security Considerations ............................................................................... 51
2-3 Scanner (MFP Models Only).................................................................................... 54
2-3-1 Overview of Scanner Operations .......................................................................... 54
2-3-2 Data Flow Security Considerations....................................................................... 54
2-3-3 Protection of Data when Performing Scanning and Sending Operations.............. 55
2-3-4 Protection of Document Server Documents.......................................................... 56
2-3-5 Protection of Sending Results and Status Information .......................................... 57
2-3-6 Protection of the Scanner Features Settings ........................................................ 57
2-3-7 Data Stored in the Job Log ................................................................................... 58
2-3-8 Terminology .......................................................................................................... 58
2-4 FAX (MFP Models Only) .......................................................................................... 59
2-4-1 Overview of FAX operations ................................................................................. 59