4 precautions for operation control, Roles and requirements of the administrator, Password usage requirements – Konica Minolta bizhub C654 User Manual
Page 9: Network connection requirements for the machine, Operation and control of the machine
bizhub C754/C654
1-6
1.4
Precautions for Operation Control
1
1.4
Precautions for Operation Control
This machine and the data handled by this machine should be used in an office environment that meets the
following conditions. The machine must be controlled for its operation under the following conditions to pro-
tect the data that should be protected.
Roles and Requirements of the Administrator
The administrator should take full responsibility for controlling the machine, thereby ensuring that no improp-
er operations are performed.
-
A person who is capable of taking full responsibility for controlling the machine should be appointed as
the administrator to make sure that no improper operations are performed.
-
When using an SMTP server (mail server) or an DNS server, each server should be appropriately man-
aged by the administrator and should be periodically checked to confirm that settings have not been
changed without permission.
Password Usage Requirements
The administrator must control the Administrator Password and Encryption Key appropriately so that they
may not be leaked. These passwords should not be ones that can be easily guessed.
-
Make absolutely sure that only the administrator knows the Administrator Password and Encryption
Key.
-
The administrator must change the Administrator Password and Encryption Key at regular intervals.
-
The administrator should make sure that any number that can easily be guessed from birthdays, em-
ployee identification numbers, and the like is not set for the Administrator Password and Encryption
Key.
-
If the Administrator Password has been changed by the Service Engineer, the administrator should
change the Administrator Password as soon as possible.
Network Connection Requirements for the Machine
If the LAN is to be connected to an outside network, no unauthorized attempt to establish connection from
the external network should be permitted.
-
If the LAN, in which the machine is installed, is connected to an outside network, install a firewall or
similar network device to block any access to the machine from the outside network and make the nec-
essary settings.
Security function operation setting operating requirements
The administrator of the machine should observe the following operating conditions.
-
The administrator should make sure that the machine is operated with the settings described in the in-
stallation checklist made properly in advance.
-
The administrator should make sure of correct operation control so that the machine is used with the
Enhanced Security Mode set to [ON].
-
When the Enhanced Security Mode is turned [OFF], the administrator is to make various settings ac-
cording to the installation checklist and then set the Enhanced Security Mode to [ON] again. For details
of settings made by the service engineer, contact your service representative.
-
When the machine is to be discarded or use of a leased machine is terminated at the end of the leasing
contract, the administrator should use the Overwrite All Data function to thereby prevent data to be
protected from leaking.
Operation and control of the machine
The administrator of the machine should perform the following operation control.
-
The administrator of the machine should log off from the Administrator Settings whenever the operation
in the Administrator Settings is completed. The administrator of the machine should also make sure that
each individual user logs off from the User Authentication mode after the operation in the User Authen-
tication mode is completed, including operation of the Encrypted document.