
Security Suggestions for Key Operators
Overview Product
To keep your machine’s
1.Key Operators are required to verify the identity of the manufacturer’s service technician, or of an affiliated company’s staff, or marketing company, by requesting their ID Card.
Do not give the device information by phone or email.
2.Always connect through a Firewall when installing your device on a network that is connected to the Internet. When connecting this device to a client PC, or a server, we recommend configuring your network environment with a switching hub to prevent your device from being wiretapped.
3.A Key Operator password is essential to maintaining the security of the device. Key Operators are required to change the password from the initial setting, and keep the password confidential and in a safe place. To change the initial Key Operator password, refer to the Operating Instructions (For Function Parameters) and set up [General Settings]
4.A Web Server password is essential to maintaining the security of the device. Change the password from the initial setting, and keep the password confidential and in a safe place. To change the initial Web Server password, refer to the Operating Instructions (Device Explorer and Embedded Web Server).
When setting, do not leave this device unattended. Also, when setting using a browser, do not leave the PC unattended after logging in.
5.Change the Hard Disk Drive Lock password from the initial setting. By setting a password, even if the Hard Disk Drive is taken away, the password locked device prevents illicit retrieval of the data by unauthorized personnel.
The Hard Disk Drive Lock password is required when the equipment is being repaired. Furthermore, it is essential that the Key Operator personally enter the password to maintain security of the password and prevent unauthorized users. To change the initial Hard Disk Drive Lock password, refer to the Operating Instructions (For Function Parameters) and set up [General Settings]
6.To prevent illicit use by unauthorized personnel, perform the following for ID/password settings.
1)Use the maximum number of digits.
2)Use a variety of the accepted character types.
3)Change the ID and password periodically.
Make sure that the setting screen can only be seen by the Key Operator when setting/changing various ID and passwords. Keep this information confidential.
7.The documents stored in the Mail Box should be printed immediately. Upon printing, the document data is deleted, thus preventing unauthorized re- printing by a third party. For additional information, please refer to MailBox of the Operating Instructions (Printer Driver).
8.Scan data stored in the hard disk can be viewed and deleted by anybody. Transfer to another medium and delete from the hard disk immediately. For additional information, please refer to the Operating Instructions (For Basic Operations) of provided booklet.
9.When finished, be sure to press the Reset button and return to the standby screen. Also, do not reset Auto Reset Time settings.
10.When disposing of this equipment, initialize the Hard Disk Drive, and overwrite or delete the data area stored in the Hard Disk Drive. To delete the data area in the Hard Disk Drive, contact the authorized Panasonic dealer for a service technician. To initialize the Hard Disk Drive, refer to the Operating Instructions (For Function Parameters) and set up [General Settings]
11.When disposing of SD cards and other external memory cards, destroy the card or use wiping software to completely delete the data. Data on SD cards and other external memory cards are your responsibility.
12.Scanned (text and images), received and set/ registered information (addresses) are your responsibility. If the device malfunctions and the data are deleted, it cannot be recovered and is not covered in the warranty.
13.Incorrect settings may leak settings or impede use of this device. Check the details carefully when performing settings.
❈The security settings on this equipment are restricted and require the input of an
The Key Operator plays a critical part in maintaining and controlling the security of the device and in prevention of its unauthorized access, therefore, it is of utmost importance that you understand the content described in the Operating Instructions and that you follow the suggestions herein.
12