Setting Data to be kept
Data not kept (Data to be
initialized)
Required time
File System Data
Only
• Embedded Software
Architecture
applications'
program/log
• Address Book
• Sent and received
emails
• Files stored using the
Capture function
• Thumbnails of stored
files
• Job logs/access logs
• Stored documents
(stored documents in the
Document Server)
• Registered stamps
Approximately 1
hour
All Data All Data None
Approximately 6
hours
Things to note when enabling encryption settings
• If you use Embedded Software Architecture application, be sure to specify [File System Data
Only] or [All Data].
• Note that the machine's settings will not be initialized to their system defaults even if [Format All
Data], [File System Data Only], or [All Data] is specified.
Use the following procedure to enable the encryption settings when first setting up the machine, or after
encryption settings have been canceled and settings must be made again.
• The machine cannot be operated while data is being encrypted.
• Once the encryption process begins, it cannot be stopped. Make sure that the machine's main power
is not turned off while the encryption process is in progress. If the machine's main power is turned off
while the encryption process is in progress, the hard disk will be damaged and all data on it will be
unusable.
• The encryption key is required for data recovery if the machine malfunctions. Be sure to store the
encryption key safely for retrieving backup data.
• Encryption begins after you have completed the control panel procedure and rebooted the machine
by turning off and on the main power switch. If there is unencrypted data on the hard disk that must
be both transferred and encrypted, rebooting will take up to six and a half hours. If there is encrypted
data on the hard disk that must be re-encrypted, rebooting will also take up to six and a half hours.
If both the erase-by-overwrite function and the encryption function are specified, encryption begins
Encrypting Data on the Hard Disk
101