Fuji Xerox Versant 80 Press User Manual page 553

Table of Contents

Advertisement

disk. It also applies to copy document and other information stored temporarily by the
system.
The following option can be configured.
Number of Overwrites
You can set the number of overwrites.
Important • If the machine is turned off during the overwriting, unfinished files may remain on the hard disk. The
For more information on how to check the status during overwriting, refer to "Overwrite Hard Disk" (P.628).
Prerequisite for Using the Data Security Feature
The system administrator must follow the instructions below:
To protect the data deleted from or stored on the hard disk, the following settings are
required:
- Number of Overwrites: [1 Overwrite] or [3 Overwrites]
- Data Encryption: [On]: an encryption key of 12 digits
- Service Representative Restricted Operation: [Yes]
Change the system administrator's factory default passcode (x-admin). Register a new
passcode of 7 characters or more (maximum 12 characters). Be careful not to register a
passcode that can be easily assumed and not to store the registered passcode on a
location that is easily accessible to other persons.
Important • If the system administrator's user ID and passcode are forgotten, the machine configuration will
Set [Passcode Entry for Control Panel Login] to [On].
Set [Maximum Login Attempts by System Administrator] to 5 times.
Note that the hard disk security will not be warranted if you do not correctly follow the
above setting instructions.
For more information on how to set data encryption, refer to "Data Encryption" (P.453).
For more information on how to set service representative restricted operation, refer to "Service Rep. Restricted Operation"
(P.455).
For more information on how to set [Passcode Entry for Control Panel Login], refer to "Passcode Policy" (P.549).
For more information on how to set the system administrator's user ID, refer to "System Administrator's Login ID" (P.543).
The manager (of the organization that this machine is used for) must follow the
instructions below:
Assign an appropriate person as a system administrator and manage and train the
person properly.
When turning off the machine, make sure no operation is running. Train the users to turn
off the machine after an active operation completes, if any.
Note that the Data Security Feature is used to protect deleted document data from being
recovered; it does not protect files stored in folders in the hard disk.
Install an anti-bugging device on the internal network that the machine with the Data
Security Feature is located on, and perform the network settings properly to protect the
machine from interceptions.
To block unauthorized access, install a firewall device between the external network and
the internal network that the machine is located on.
overwriting will resume if you turn the machine on again with the unfinished files remaining on the
hard disk.
• Overwriting once erases the data, but overwriting three times makes it even more definite that the
data cannot be restored. It does, however, take longer.
• During overwriting, normal operations may be slowed down.
not be able to recover in case of malfunction.
Authentication/Security Settings
553
13

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents