Security Target
Page 22
... through the network or the USB Port that is imported to the TOE. 2. The D-BOX protects the document data from Copyright (c) 2009,2010 RICOH COMPANY, LTD. Sent to the TOE via the internal network or the USB Port. Sent as a fax. When passing from unauthorised access and leakage...data can handle. When output using methods 1 to 3, document data is protected from the scanned image of this TOE (document data and print data). 1.4.5.1 Document Data Document data is imported from the document files in a client computer by the printer or fax drivers installed on the client computer when it...
... through the network or the USB Port that is imported to the TOE. 2. The D-BOX protects the document data from Copyright (c) 2009,2010 RICOH COMPANY, LTD. Sent to the TOE via the internal network or the USB Port. Sent as a fax. When passing from unauthorised access and leakage...data can handle. When output using methods 1 to 3, document data is protected from the scanned image of this TOE (document data and print data). 1.4.5.1 Document Data Document data is imported from the document files in a client computer by the printer or fax drivers installed on the client computer when it...
Security Target
Page 79
...TOE, and management of thedocument data ACL, which is a person who perform either of general user information. Copyright (c) 2009,2010 RICOH COMPANY, LTD. Also known as an intranet. A function that controls access to the MFP by the MFP. Electronic data sent to ...the document data. Scanning from leakage. Page 79 of administrator role: user administration, machine administration, network administration, and file administration. Each administrator role is a person who are registered in the document data ACL as...
...TOE, and management of thedocument data ACL, which is a person who perform either of general user information. Copyright (c) 2009,2010 RICOH COMPANY, LTD. Also known as an intranet. A function that controls access to the MFP by the MFP. Electronic data sent to ...the document data. Scanning from leakage. Page 79 of administrator role: user administration, machine administration, network administration, and file administration. Each administrator role is a person who are registered in the document data ACL as...