Security Target
Page 22
...a client computer(to 3, document data is protected from the document files in a client computer by the printer or fax drivers installed on the client computer when it . It is generated from leakage, and tampered data can be imported by the following ...five methods: 1. From a scanner Document data is created from outside the TOE by various methods, and can be either stored in the TOE or ...can be deleted. The D-BOX protects the document data from Copyright (c) 2009,2010 RICOH COMPANY, LTD.
...a client computer(to 3, document data is protected from the document files in a client computer by the printer or fax drivers installed on the client computer when it . It is generated from leakage, and tampered data can be imported by the following ...five methods: 1. From a scanner Document data is created from outside the TOE by various methods, and can be either stored in the TOE or ...can be deleted. The D-BOX protects the document data from Copyright (c) 2009,2010 RICOH COMPANY, LTD.