background image

Data Security Kit

Document

HDD

Setting a password

copy/print/scan

00000

00000

HDD

Common Criteria Validated EAL2
Data Security Kit DA-SC01 V1.01 and DA-SC03 V1.01

Overview of security functions

Document data that is temporarily stored on the hard disk 
when using the copier/printer/scanner functions is deleted 
immediately after completion of the operation. However, when 
data is deleted from the hard disk, typically only the data 
management information that controls access to the data is 
deleted. The actual data itself remains intact. As a result, the 
document data remains on the hard disk, and can possibly be 
recovered and read by a computer or a utility tool if the hard 
disk drive is stolen, replaced or disposed of.
To protect your document data, the

 Data Security Kit

 provides the following security functions.

(1) Document data deletion

Automatically deletes the data regions on the hard disk drive by overwriting 
the data when outputting the document. Two levels of overwriting security are available:

Medium:

  Deletes all data by zeroing out all of the document’s data sectors in three passes.

High: 

       Assigns random values to the document’s data sectors in the first two passes, then           

                  zeroes out all the data in the third pass.
Before replacing or disposing of the device, it is strongly recommended that the hard disk be initialized 
and that all data sectors be overwritten in such a way that the data cannot be restored. This can be 
done utilizing the Data Security Kit’s built-in initialization function.

(2) Hard disk drive lock management

Setting a password for the hard disk drive helps prevent unauthorized use of the data it contains,
even if the hard disk drive is removed. Attempting to use a ‘locked’ hard disk drive in another device 
without the correct password will result in the drive’s data being overwritten.

(3) Security setting protection

Security settings on the device can only be made or changed by the key operator, and only after 
entering a user-defined, 8-character password.

The DA-SC01 and DA-SC03 Data Security Kits have been approved as EAL2 certified system products.

What is “Common Criteria”?

Common Criteria is an international standard defined as 
ISO15408, which is used to evaluate an information 
system or the hardware and software that comprises the 
information system, based on the targeted security 
assurance level.

What is “EAL”?

EAL stands for Evaluation Assurance Level, which indicates the 
strictness of the evaluation level, and not the level of security.
The EAL is defined in seven levels as shown in the table 
on the right.

Assurance Levels 

EAL 1

EAL 2

EAL 3

EAL 4

EAL 5

EAL 6

EAL 7

Level

Outline

Functionally Tested

Structurally Tested

Methodically Tested and Checked

Methodically Designed, Tested and Reviewed

Semi-formally Designed and Tested

Semi-formally Verified Design and Tested

Formally Verified Design and Tested

A simple “add-on” security solution for your existing devices

The certification obtained for this product regarding information security indicates that, as a result of 
evaluation based on given evaluation criteria and evaluation method, the target of evaluation used 
for such evaluation has been determined to conform to the security assurance requirements.

Summary of Contents for DP-MB350

Page 1: ...User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD Memory Security Fax to Ethernet Connection Data Security Kit ...

Page 2: ...nd faxes used in the office All of these devices handle and process important data so more effective ways of preventing security breaches are required How to protect data Even when users recognize the importance of security they may not know how to protect their data or may find that maintaining security interferes with normal operations Consequently many users tend to ignore these problems Protec...

Page 3: ...er their login name and password before they can use any device Authentication is performed using the user s Windows account 1 User ID Enter user name up to 40 characters not case sensitive 2 Password Enter password up to 40 characters case sensitive 3 Domain Selectable domain name available Function Independent Authentication In addition to a universal setting since User Authentication can be set...

Page 4: ... administrator will receive a log report via email detailing all fax transmission reception activity and all email transmission reception to an Internet Fax or PC Even fax transmission reception via the PSTN line can be logged so the system administrator will be able to keep tabs on everything sent and received whether via Internet or telephone line Job Tracking email to administrator includes Nam...

Page 5: ...way you manage your fax transmission log data For more security In addition to managing fax recipients and data transmitted via the RightFax Server you can use User Authentication for more secure fax transmissions With User Authentication you can prevent unauthorized fax transmissions via RightFax Server Requires RightFax Ver 8 0 or later Windows Server Panasonic Device Mail Server RightFax Server...

Page 6: ...ta and print it out anytime you want This can be very useful when the printer is busy Secure Mailbox provides further security Once the data is stored in the Secure Mailbox you have to enter a multi digit user ID and password to print it This is especially useful for sensitive documents 1 Mailbox data printing Data stored in the Mailbox storage area can be printed out by entering your Mailbox ID n...

Page 7: ...e three security levels are available depending on your requirements The security level can be defined by the system administrator Basic Deletes header information in the control area of the HDD Medium Overwrites with zeros High Overwrites with random data and zeros on the HDD 2 Bulk Erasure One of the most common ways for critical data to find its way into the wrong hands is through improper disp...

Page 8: ... reception and does not incorporate the communication protocols used by a data modem This means that is not possible to connect to the Panasonic device via the PSTN line and make a connection to the network If an attempt is made to connect to the Panasonic device from a data modem via the PSTN line the device will immediately terminate the connection to interrupt the communication LAN PC PC PSTN D...

Page 9: ...tion 2 Hard disk drive lock management Setting a password for the hard disk drive helps prevent unauthorized use of the data it contains even if the hard disk drive is removed Attempting to use a locked hard disk drive in another device without the correct password will result in the drive s data being overwritten 3 Security setting protection Security settings on the device can only be made or ch...

Page 10: ...6 C306 C266 C405 C305 C265 C354 C264 C323 C263 C213 C322 C262 8060 8045 8035 3030 2330 8020E 8020P 1820E 1820P 190 UF 9000 8000 7000 8200 7200 Internet Fax Email Network Scanner Module is required for the UF 8000 7000 8200 AUG 7200 Internet Fax E Mail Module is required for the DP 1820E 1820P Secure Printing Functions DP C406 C306 C266 C405 C305 C265 C354 C264 C323 C263 C213 C322 C262 8060 8045 80...

Reviews: