Security Precautions; To General Users - Toshiba e-studio 2000ac Safety Information Manual

Multifunctional digital color systems
Hide thumbs Also See for e-studio 2000ac:
Table of Contents

Advertisement

 Security Precautions
In order to make correct use of this equipment's security function, first read the following precautions
carefully. Be sure to assign administrators who have enough capability to sustain responsible
management since significant privileges for managing and handling this equipment will be given them.
 To Administrators
 To avoid physical security problems, such as hardware removal or inappropriate disassembly at the
installation site, take all necessary measures, such as checking who enters and leaves the site.
 When connecting this equipment with an outer network such as the Internet, only operate it in a
network environment protected by a firewall, etc. to prevent information from being leaked due to
incorrect settings or avoid illegal access by unauthorized users.
 To prevent the configuration settings from being altered improperly or similar, before you use this
equipment, change the administrator and user registration passwords set by factory default. Also,
be sure periodically to change each password set for this equipment.
 In order to make proper use of the network and user management functions, be sure to read the
TopAccess Guide first.
 Be sure to understand the security policy and its procedure in your organization, and manage and
operate this equipment and external devices according to the policy after first reading the
operator's manual. Then explain the security instructions to general users who are authorized to
use this equipment to allow them to conform to the security rules.
 Provide general users with the appropriate privilege of using this equipment and keep supervising
its correct operation.
 Always check if the network function and user management function are enabled in order to
maintain security. Should you happen to come across any abnormality, contact your service
technician immediately. See the TopAccess Guide for the checking method.
 If any failure or unauthorized access occurs in this equipment, check the logs in TopAccess to find
the cause. See the TopAccess Guide for details of checking logs.
 Be sure to keep the OSs and browsers, which are installed in your computer used by connecting this
equipment, in the latest status. Then explain this to general users of this equipment to allow them
to conform to this.
 To General Users
 After you have finished operating the equipment, be careful not to forget to remove any originals,
printed paper or USB storage devices.
 Change the password regularly. Make sure not to use any predictable number such as your birthday
or employee ID number, and keep it secret.
 Do not leave the equipment during the performance of a job since your originals may be seen or the
output paper could be taken by someone.
 Check your log regularly to guard against unauthorized access by identity theft. If there are too
many logs, you may find the one you want more easily using the sort function in TopAccess.
Safety Information 5

Advertisement

Table of Contents
loading

Table of Contents