Precautions For Operation Control; Roles Of The Owner Of The Machine; Roles And Requirements Of The Administrator; Password Usage Requirements - Konica Minolta BIZHUB C658 User Manual

Hide thumbs Also See for BIZHUB C658:
Table of Contents

Advertisement

1.3

Precautions for Operation Control

1.3
Precautions for Operation Control
This machine and the data handled by this machine should be used in an office environment that meets the
following conditions. The machine must be controlled for its operation under the following conditions to pro-
tect the data that should be protected.

Roles of the Owner of the Machine

The owner (an individual or an organization) of the machine should take full responsibility for controlling the
machine, thereby ensuring that no improper operations are performed.
-
The owner of the machine should have the administrator recognize the organizational security policy
and procedure, educate him or her to comply with the guidance and documents prepared by the man-
ufacturer, and allow time for him or her to acquire required ability. The owner of the machine should
also operate and manage the machine so that the administrator can configure and operate the machine
appropriately according to the policy and procedure.
-
The owner of the machine should have users of the machine recognize the organizational security policy
and procedure, educate them to follow the policy and procedure, and operate and manage the machine
so that the users acquire the required ability.
-
The owner of the machine should vest the user with authority to use the machine according to the or-
ganizational security policy and procedure.
-
The owner of the machine should operate and manage the machine so that the administrator checks
the Job Log (Audit Log) data at appropriate timing to thereby determine whether a security compromise
or a faulty condition has occurred during an operating period.
-
If the Job Log (Audit Log) data is to be exported to another product, the owner of the machine should
ensure that only the administrator performs the task. The owner of the machine should also operate and
manage the machine so that the Job Log (Audit Log) data is not illegally accessed, deleted, or altered.

Roles and Requirements of the Administrator

The administrator should take full responsibility for controlling the machine, thereby ensuring that no improp-
er operations are performed.
-
A person who is capable of taking full responsibility for controlling the machine should be appointed as
the administrator to make sure that no improper operations are performed.
-
When using an external authentication server, an SMTP server (mail server), or a DNS server, each serv-
er should be appropriately managed by the administrator and should be periodically checked to confirm
that settings have not been changed without permission.

Password Usage Requirements

The administrator must control the Administrator Password, Encryption Key, FW Update (USB) Password,
and User Box Password appropriately so that they may not be leaked. These passwords should not be ones
that can be easily guessed. The user, on the other hand, should control the Secure Print Password and User
Password appropriately so that they may not be leaked. Again, these passwords should not be ones that can
be easily guessed.
<To Achieve Effective Security>
-
Make absolutely sure that only the administrator of the machine knows the Administrator Password.
-
Make absolutely sure that only the administrator knows the Encryption Key, FW Update (USB) Pass-
word, and User Box Password.
-
Make sure that the administrator of the machine changes the Administrator Password regularly.
-
The administrator must change the Encryption Key, FW Update (USB) Password, and User Box Pass-
word at regular intervals.
-
The administrator of the machine should make sure that any number that can easily be guessed from
birthdays, employee identification numbers, and the like is not set for the Administrator Password.
-
The administrator should make sure that any number that can easily be guessed from birthdays, em-
ployee identification numbers, and the like is not set for the Account Password, Encryption Key, FW
Update (USB) Password, and User Box Password.
-
If a User Password has been changed, the administrator should have the corresponding user change
the password as soon as possible.
-
If the Administrator Password has been changed by the Service Engineer, the administrator of the ma-
chine should change the Administrator Password as soon as possible.
bizhub C658/C558/C458
1
1-9

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Bizhub c558Bizhub c458

Table of Contents