Authentication/Security Settings
461
• When turning off the machine, make sure no operation is running. Train the users to turn
off the machine after an active operation completes, if any.
• Note that this feature is used to protect deleted document data from being recovered; it
does not protect files stored in folders in the hard disk.
• Install an anti-bugging device on the internal network that the machine is located on, and
perform the network settings properly to protect the machine from interceptions.
• To block unauthorized access, install a firewall device between the external network and
the internal network that the machine is located on.
• Set the passcode and encryption key according to the following rules:
- Do not use easily assured character string
- Use both characters and numerics
For more information on encryption key, refer to "Encryption Key for Confidential Data" (P.346).