Data Security Kit
Document
HDD
Setting a password
copy/print/scan
00000
00000
HDD
Common Criteria Validated EAL2
Data Security Kit DA-SC01 V1.01 and DA-SC03 V1.01
Overview of security functions
Document data that is temporarily stored on the hard disk
when using the copier/printer/scanner functions is deleted
immediately after completion of the operation. However, when
data is deleted from the hard disk, typically only the data
management information that controls access to the data is
deleted. The actual data itself remains intact. As a result, the
document data remains on the hard disk, and can possibly be
recovered and read by a computer or a utility tool if the hard
disk drive is stolen, replaced or disposed of.
To protect your document data, the
Data Security Kit
provides the following security functions.
(1) Document data deletion
Automatically deletes the data regions on the hard disk drive by overwriting
the data when outputting the document. Two levels of overwriting security are available:
Medium:
Deletes all data by zeroing out all of the document’s data sectors in three passes.
High:
Assigns random values to the document’s data sectors in the first two passes, then
zeroes out all the data in the third pass.
Before replacing or disposing of the device, it is strongly recommended that the hard disk be initialized
and that all data sectors be overwritten in such a way that the data cannot be restored. This can be
done utilizing the Data Security Kit’s built-in initialization function.
(2) Hard disk drive lock management
Setting a password for the hard disk drive helps prevent unauthorized use of the data it contains,
even if the hard disk drive is removed. Attempting to use a ‘locked’ hard disk drive in another device
without the correct password will result in the drive’s data being overwritten.
(3) Security setting protection
Security settings on the device can only be made or changed by the key operator, and only after
entering a user-defined, 8-character password.
The DA-SC01 and DA-SC03 Data Security Kits have been approved as EAL2 certified system products.
What is “Common Criteria”?
Common Criteria is an international standard defined as
ISO15408, which is used to evaluate an information
system or the hardware and software that comprises the
information system, based on the targeted security
assurance level.
What is “EAL”?
EAL stands for Evaluation Assurance Level, which indicates the
strictness of the evaluation level, and not the level of security.
The EAL is defined in seven levels as shown in the table
on the right.
Assurance Levels
EAL 1
EAL 2
EAL 3
EAL 4
EAL 5
EAL 6
EAL 7
Level
Outline
Functionally Tested
Structurally Tested
Methodically Tested and Checked
Methodically Designed, Tested and Reviewed
Semi-formally Designed and Tested
Semi-formally Verified Design and Tested
Formally Verified Design and Tested
A simple “add-on” security solution for your existing devices
The certification obtained for this product regarding information security indicates that, as a result of
evaluation based on given evaluation criteria and evaluation method, the target of evaluation used
for such evaluation has been determined to conform to the security assurance requirements.