beautypg.com

1 security, 1 introduction, Compliance with the iso15408 standard – Konica Minolta bizhub C35 User Manual

Page 5: Operating precautions, Security, 1security

background image

bizhub C35

1-2

1.1

Introduction

1

1

Security

1.1

Introduction

Thank you for purchasing our product.

This User's Guide contains the operating procedures and precautions to be used when using the security
functions offered by the bizhub C35 machine. To ensure the best possible performance and effective use of
the machine, read this manual thoroughly before using the security functions. The Administrator of the ma-
chine should keep this manual for ready reference. The manual should be of great help in finding solutions to
operating problems and questions.

This User's Guide (Ver. 1.00) describes bizhub C35 Multi Function Peripheral Control Software (Controller
Firmware: A12130G050105, Boot Control Section: A12199G0040000).

Compliance with the ISO15408 Standard

When the Enhanced Security Mode on this machine is set to [ON], more enhanced security functions are
available.

The security functions offered by the bizhub C35 machine comply with ISO/IEC15408 (level: EAL3).

Operating Precautions

The machine gives an alarm message or an alarm sound (peep) when a wrong operation is performed or a
wrong entry is made during operation of the machine. (No "peep" alarm sound is issued if a specific sound
setting in Sound Setting of Accessibility Setting is set to [No].) If the alarm message or alarm sound is given,
perform the correct operation or make the correct entry according to the instructions given by the message
or other means.

The Administrator of the machine should not leave the machine with the setting screen left displayed after
the access to that mode is completed or in the middle of the mode. If it is absolutely necessary to leave the
machine, the Administrator of the machine should log off from the mode.

The Administrator of the machine should make sure that each individual general user logs off from the current
mode whenever the access to that mode is completed or if the user leaves the machine in the middle of the
mode with the mode screen left displayed.

To prevent settings of the machine from being duplicated, the Administrator of the machine should not at-
tempt to change the settings in a condition of having logged onto a mode simultaneously from the control
panel and the client PC.