[. . . ] 1. 05 Contents Contents 1 Security 1. 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2 Compliance with the ISO15408 Standard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2 Operating Precautions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2 INSTALLATION CHECKLIST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3 Security Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4 Check Count Clear Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4 Data to be Protected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6 Precautions for Operation Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ] For the overwrite methods of [Mode 1] to [Mode 8], see "Setting the Overwrite All Data function" on page 2-78. 501/421/361 2-70 Administrator Operations 2 16 A message appears asking whether you want to overwrite all data. Select [YES] and touch [OK]. 17 18 "All data is being overwritten and cleared. Make sure that a message appears prompting you to turn OFF and then ON the main power switch. Now, turn OFF and then turn ON the main power switch. 501/421/361 2-71 Administrator Operations 2 2. 12 Protecting Data Stored in the Flash Memory The administrator settings in this machine allow setting or changing the Flash Memory Lock Password that is used to authenticate the Administrator of the machine. Should the flash memory be removed unawares, the Flash Memory Lock Password locks the flash memory protecting data contained in it. The Flash Memory Lock Password entered is displayed as "*. " 2 Note Set unique password for Flash Memory Lock Password. Do not set any number that can easily guessed from birthdays, employee identification numbers, and the like for Flash Memory Lock Password. Make sure that nobody but the Administrator of the machine comes to know the Flash Memory Lock Password. 2 Note When the Flash Memory Lock Password is set, flash memory verification is carried out when the machine is started. If the flash memory is illegally replaced with another and the flash memory cannot be unlocked by the Flash Memory Lock Password, the machine sounds an alert and stops booting while displaying an hourglass icon on the control panel. If the flash memory does not have the Flash Memory Lock Password setting, the control panel displays Service Call "SC-D303", a message that tells there is a mismatch between the flash memory and the Flash Memory Lock Password. Even if the flash memory is illegally removed or replaced with another, detection of a wrong Flash Memory Password five consecutive times will lock the authentication function. Leak of data can thus be prevented. 2. 12. 1 Setting the Flash Memory Lock Password 2 Note When the main power switch is turned OFF and ON, wait at least 10 seconds to turn it ON again after turning it OFF. If there is no interval between turning the main power switch OFF and ON, the machine may not function properly. Here is the sequence through which the main power switch and sub power switch are turned ON and OFF. Here is the sequence, through which the main power switch and sub power switch are turned on and off: Turn off the sub power switch Turn off the main power switch Turn on the main power switch Turn on the sub power switch Do not leave the machine with the setting screen of Administrator Settings left shown on the display. If it is absolutely necessary to leave the machine, be sure first to log off from the Administrator Settings. <Setting can be made only from the control panel> 0 For the procedure to call the Security Settings menu to the display, see steps 1 and 2 of "Setting the Enhanced Security Mode" on page 2-11. Call the Security Settings to the screen from the control panel. 1 501/421/361 2-72 Administrator Operations 2 2 Touch [Forword]. 3 Touch [Flash Memory Lock Password]. 4 Enter the 20-digit Flash Memory Lock Password from the keyboard and key pad. ­ ­ ­ ­ Press the [C] key to clear all characters. Touch [Cancel] to go back to the Security Settings screen. 501/421/361 2-73 Administrator Operations 2 5 Touch [OK]. ? What happens if the Flash Memory Lock Password entered does not meet the requirements of Password Rules?% If the Flash Memory Password entered does not comply with the Password Rules, a message appears saying that the Flash Memory Password entered cannot be used. For details of the Password Rules, see "Password Rules" on page 1-9. % To change the Flash Memory Lock Password, see "Changing the Flash Memory Lock Password" on page 2-75 6 To prevent entry of a wrong password, enter the 20-digit Flash Memory Lock Password once again. ­ ­ ­ ­ Press the [C] key to clear all characters. Touch [Cancel] to go back to the Security Settings screen. 7 Touch [OK]. ?% 8 What happens if there is a mismatcn in the Flash Memory Lock Passwords? [. . . ] If there is no wait period between turning the main power switch off, then on again, the machine may not function properly. Here is the sequence, through which the main power switch and sub power switch are turned on and off: Turn off the sub power switch Turn off the main power switch Turn on the main power switch Turn on the sub power switch 5 From "Backup media, " select the check box of the desired media and click [Next]. 6 Click [Browse] and specify the destination, in which the backup folder is to be saved. 501/421/361 4-26 Application Software 4 7 Type a backup folder name that consists of one to 50 characters in the "Backup folder name" text box and click [Next]. 8 To set a password for the backup file, select the corresponding check box and type a password that consists of one to 64 digits in the "Password for the backup files" and "Confirm the password" boxes and then click [Next]. 9 Check the data that has been set and click [Start]. 501/421/361 4-27 Application Software 4 10 Make sure that the backup procedure has been completed. Then, click [Finish]. 2 Reminder In Backup, none of the following settings are backed up: Administrator Password, CE Password, HDD Lock Password, Flash Memory Lock Password, Image Data Encryption Passphrase, and CE Lock Release Time. Pay attention to which settings are backed up and which are not when restoring data. [. . . ]