SECURITY
Industry-Leading Multi-Layered Security
With multiple levels of network and data security to cover a wide range of security needs, Sharp’s
Data Security Kit
Digital copier/printers or multifunction products can retain hundreds of pages of confidential information from previous jobs on their hard disks or internal memory. To safeguard this information from unauthorised access, the optional Data Security Kit automatically encrypts and erases the data after each job is complete as well as data stored both on the hard disk and in the address book.
IP/MAC Address Filtering
The
* U models require optional
IP/MAC Address Filtering |
|
|
|
| Data Security System |
| ||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
OK |
|
|
|
| Copy Data |
|
| Print Data |
| |||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
| Scan Data |
|
| Fax Data |
| ||||||||
|
|
|
|
|
|
|
| |||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
NO! |
|
|
|
|
|
|
|
| d0bN% |
|
|
|
| |||
|
|
|
|
|
|
|
|
|
|
|
| |||||
|
|
|
|
|
|
|
| =5!”//? |
|
|
| |||||
|
|
|
|
|
|
|
|
|
|
| ||||||
|
|
|
|
|
|
|
|
|
|
| ||||||
|
|
|
| SECRET |
|
|
|
|
| |||||||
|
|
|
|
|
|
| hj5&4 |
|
|
|
| |||||
|
|
|
|
|
|
|
|
|
|
|
| |||||
|
| TOP |
|
|
|
|
|
|
|
| ||||||
Unknown IP or MAC addresses |
|
|
|
|
| mk9#¥ |
|
|
|
| ||||||
|
|
|
|
|
|
|
|
|
|
|
| |||||
|
|
|
|
|
|
|
|
|
|
|
| |||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
will be denied access | Data Encryption | Data Erase |
|
Prevents data leak
The data generated for each job is automatically erased once that job is finished
Print Hold and Confidential Print
To keep others from seeing confidential documents as they are being printed out, the
* U models require
Set PIN on your PC. | User enters PIN on | Confidential |
| control panel. | printouts won’t be |
Data is sent from PC. | ***** | read by others. |
|
| |
|
| CONFIDENTIAL |
Secure Sockets Layer
A newly introduced SSL*1 (secure sockets layer) enables the encryption of data communications to prevent data leakage through the network when printing via IPP, browsing secure Web pages (HTTPS) or communicating via
*1: U models require
*2: Available at a later date
Auditing Mode
Auditing modes can be set individually for each function (copy, print, scan, fax, document filing), so you can keep track of and control the amount of use by employee or department. Limitations can be set for each account and each function.
User Authentication for Network Scanning
To prevent unauthorised use of network scanning, the
authentication methods are provided (Simple,
IPv6 and IPsec Support
The
* U models require
8