UTAX 5009ci handleiding

133 pagina's
PDF beschikbaar

Handleiding

Je bekijkt pagina 99 van 133
Security Settings
User Guide 95
Data Overwrite Method
Select the data overwrite method.
1-time Overwrite Method: The 1-time overwrite method overwrites unneeded data
areas (in the case of overwriting) or all the data areas (in the case of system initial-
ization) with specific numbers to prevent data restoration.
3-time Overwrite Method (A): The 3-time overwrite method complies with DoD
5220.22-M, and overwrites unneeded data areas (in the case of overwriting) or all
the data areas (in the case of system initialization) with specific numbers, their com-
plements, and random numbers to prevent data restoration. Data restoration is not
possible even through a sophisticated restoration technique.
Security Password
Enter a new security password 6 to 16 alphanumeric characters and symbols if you
change the default password.
Note: Avoid any easy-to-guess numbers for the security password (e.g. 11111111 or
12345678).
Confirm Password
Enter the password for confirmation again.
4. Click Submit button.
Data Sanitization
Return the following information registered in the machine to the factory defaults. The
information differs according to the type of machine.
1. Click Device Security under Security Settings on the navigation menu. The Security
Settings : Device Security page opens.
2. This section includes the following items for configuration.
Reserve a Sanitization Time
Erase all the address information and image data stored in the machine on the
specified schedule. When selecting On, specify the schedule to execute data saniti-
zation.
Device Use After Sanitization
Restrict use of this machine after data sanitization. Select Prohibit or Permit. When
selecting Prohibit, you cannot use the machine after data sanitization.
Data Overwrite Method
Select the data overwrite method.
3-time Overwrite Method (A): The 3-time overwrite method complies with DoD
5220.22-M, and overwrites unneeded data areas (in the case of overwriting) or all
the data areas (in the case of system initialization) with specific numbers, their com-
plements, and random numbers to prevent data restoration. Data restoration is not
possible even through a sophisticated restoration technique.
7-time Overwrite Method (A): The 7-time overwrite method complies with DoD
5220.22-M, and overwrites unneeded data areas (in the case of overwriting) with
specific numbers, their complements, and random numbers to prevent data resto-
ration. Data restoration is not possible even through a sophisticated restoration
technique.
7-time Overwrite Method (B): The 7-time overwrite method complies with BSI/

Bekijk gratis de handleiding van UTAX 5009ci, stel vragen en lees de antwoorden op veelvoorkomende problemen, of gebruik onze assistent om sneller informatie in de handleiding te vinden of uitleg te krijgen over specifieke functies.

Productinformatie

MerkUTAX
Model5009ci
CategoriePrinter
TaalNederlands
Grootte11339 MB