Concerning the Information Security Standard

This machine is compliant with IEEE Std. 2600™-2008 (IEEE 2600), an international standard concerning information security for multifunctional peripherals and printers. This section describes the security requirements defined in IEEE 2600, and the corresponding machine functions.
Security Requirement
Function on the Machine
Description
User Authentication/User Information Management:
Preventing Unauthorized Use of the Machine By Authenticating Users
SSO-H (Single Sign-On H)
SSO-H enables you to manage the machine's users by performing authentication with registered user names and passwords.
Manages user information such as user names and passwords, as well as Department IDs and roles (privileges).
Access Restrictions:
Restricting Use of Functions By User
ACCESS MANAGEMENT SYSTEM KIT*1
You can set access restrictions for functions, such as the Print or Copy function, for each user.
Audit Log*2:
Overseeing Security-Related User Operations
Generate/Export Audit Logs
You can generate user authentication logs and job logs, and export the logs in CSV format from the Remote UI.
Temporary Data Erase:
Completely Erasing Temporary Data from the Hard Disk
Data Erase Kit*1
You can erase unnecessary data from the hard disk of the machine by overwriting the data.
Data Protection*3:
Protecting Hard Disk Data and Confidential Information
HDD Data Encryption & Mirroring Kit*1
You can encrypt data stored in the hard disk such as files stored in mail boxes, information registered in the Address Book, and password information.
Network Data Protection:
Protecting Data Transmissions with Encrypted Communication
IPSec
IPSec protects data sent and received over an IP network from threats such as theft, modification, and impersonation, using security policies created for encrypted communication.
Software Verification:
Self-Verification of Security Functions
IPSec
If IPSec settings are enabled, the self-test for the code module is automatically performed when the machine starts.
*1
Indicates optional products.
*2
[Memory Media] for [Scan and Store]/[Access Stored Files] is not included in the scope of the audit.
*3
Files stored in memory media are not encrypted.
3U18-27R