Konica Minolta bizhub C364 User Manual
Page 2
bizhub C554/C454/C364/C284/C224
Contents-1
Contents
Introduction ..................................................................................................................................... 1-2
Compliance with the ISO15408 Standard ......................................................................................... 1-2
Operating Precautions ....................................................................................................................... 1-2
INSTALLATION CHECKLIST.............................................................................................................. 1-3
Precautions for Operation Control ................................................................................................ 1-6
Roles and Requirements of the Administrator ................................................................................... 1-6
Password Usage Requirements ........................................................................................................ 1-6
Network Connection Requirements for the Machine......................................................................... 1-6
Security function operation setting operating requirements.............................................................. 1-6
Operation and control of the machine ............................................................................................... 1-6
Machine Maintenance Control ........................................................................................................... 1-7
Implementing digital signature properly............................................................................................. 1-7
Operating conditions for the IC card and IC card reader .................................................................. 1-7
IC card owner requirements .............................................................................................................. 1-7
Miscellaneous.................................................................................................................................. 1-8
Password Rules ................................................................................................................................. 1-8
Precautions for Use of Various Types of Applications....................................................................... 1-8
Encrypting communications .............................................................................................................. 1-8
Items of Data Cleared by Overwrite All Data Function ...................................................................... 1-8
Fax functions...................................................................................................................................... 1-9
General functions and operations...................................................................................................... 1-9