SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
SECURE DATA
THROUGH
THE LIFE OF
DEVICES
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE
#6
At any point in time, multifunctional devices used for printing,
scanning, copying and faxing may contain, within them, large
amounts of data that should be protected – from print jobs
waiting to be printed, to received faxes, scanned data, address
books, activity logs and job history.
CANON SOLUTIONS
HDD SECURE
DATA ERASE
DATA REMOVAL
SERVICE
REMOVABLE
HARDDRIVEKIT
INTELLECTUAL
PROPERTY
CONTROL POLICY
The Risks
Unless appropriate procedures are
put in place, there is a risk that any
device removed from premises,
for whatever reason, may contain
precious information.
Organisations that use office equipment
want to know that any confidential
information held on devices during their
operation is removed or destroyed in
order to avoid heavy fines or damage
to brand reputation from data leaks.
#6 SECURE DATA
THROUGH THE
LIFE OF DEVICES
YOUROPTIONS
Formalise data
destruction policies
during the life of
a device
Remove hard disk
drives during use with
Canon’s removable
hard disk drive kit*
Erase sensitive data in
real time with Canon’s
hard disk secure data
erase tool
Ensure data stored in
devices is removed at
end of life with Canon’s
data removal service
Canon devices protect data at each
stage of the device life-cycle to
safeguard confidentiality and
integrity, ensuring the availability
of data is maintained.
DEVICE LIFE CYCLE
BEFORE USE
Configure devices against
a security hardening profile
aligned to your risk appetite
How?
Canon hardening guide and
PDI configuration services
IN USE
Ensure any data created,
published and stored during
operation is kept safe
How?
IP control policy, Removable
hard drive, HDD secure data
erase, Data encryption
AFTER USE
Prevent data resident on devices
and their hard drives from
falling into the wrong hands
How?
Data removal service for
end-of-life devices
*HDD available with specific devices only Secure Data Through the Life of Devices 32 Secure Data Through the Life of Devices
Keep device hard disks in a safe
place when not in use.
REMOVABLE
HARD DRIVE
KIT
INTELLECTUAL
PROPERTY
CONTROL
POLICY
As part of our Intellectual Property Control Policy,
no hard disk drive will be removed without
confirmation from an authorised responsible user.
As it always remains the responsibility of the
information owner to correctly destroy data at the
end of its life, the user may wish to retain the hard
disk drive. These arrangements can be discussed
and formalised in property control policies that Canon
can implement as part of a Managed Print Service.
The optional kit allows the removal of a hard disk for
storage in a secure location. The hard disk can be
removed and reinstalled easily and securely. Once
installed, it is secured by padlock.
When the HDD Mirroring Kit or HDD Data Encryption
& Mirroring Kit is used with the Removable HDD Kit,
you can store the same data on two hard disks and
you can encrypt the data and store the hard disks in
a safe place.
It is important for organisations
to consider data destruction at
(1) the end of the device life,
(2) an in-service failure or
(3) as part of a device movement.
WHY USE IT?
This feature provides another layer of data security
for government agencies, corporate offices, law firms,
financial institutions, and other organisations that
need to ensure that data stored on the hard disk is
physically secured when the unit is not in use.
IN USE IN USE
Secure Data Through the Life of Devices 54 Secure Data Through the Life of Devices
HDD SECURE
DATA ERASE
IT’S REAL TIME
Real time erasure of sensitive data stored on hard
disk drive of the device produced during copying,
printing, scanning and faxing is possible and can
prevent the reprinting of materials.
PREVENTS A DATA TRAIL
Secure data erase provides an additional level of
assurance by removing or protecting data at rest
on the MFD. Without this functionality enabled
only the pointer to the data is deleted and not the
actual data itself.
THE FOLLOWING DATA IS
COMPLETELY ERASED:
• Image data created when scanning
• Temporary data created when using the Remote
or Cascade Copying mode
• Data that remained after you deleted a
document in an inbox
• Sent and received fax/I-fax data
• Spooled data
• Data temporarily stored as print data
If the HDD Secure Data Erase option is enabled,
data is automatically and completely erased when
it is deleted from the hard disk and ensures that no
data remains. You can select the Erase mode and
timing for erasing data from the hard disk.
Canon offers a comprehensive service to help protect
sensitive information by removing all user data from
redundant, end-of-life print devices.
A number of options are available based on customer
requirements and regional regulations.
DATA REMOVAL
SERVICE
For each Canon MFD that is used
for the output of sensitive material,
we recommend the use of the
Canon Hard Disk Drive (HDD)
Secure Data Erase option.
Ensure sensitive data is removed
permanently from end-of-life devices
AFTER USE
Hard Disk Erase to DoD standard
Device Inspection and certification
Hard Disk Removal and hand over
to customer
Device Inspection and certification
Hard Disk Removal and safe disposal in
line with WEEE directive
Device Inspection and certification
1
2
3
IN USE
6 Secure Data Through the Life of Devices Secure Data Through the Life of Devices 7
Canon Europe Ltd
3 The Square,
Stockley Park,
Uxbridge,
Middlesex
UB11 1ET
UK
Canon U.K. Ltd
Woodhatch
Reigate
Surrey
RH2 8BF
UK
Canon Inc.
Canon.com
Canon Europe
canon-europe.com
English Edition
© Canon Europa N.V., 2017
INTERESTED?
There is no fool-proof plug and
play office security solution.
Every business has to determine
what represents an acceptable
level of risk.
Canon is a pro-active partner to
businesses seeking to keep data
safe as part of a resilient enterprise
information security policy.
One voice
Our information security team is responsible for
both Canon’s internal information security, and the
advice and solutions we offer to our customer.
Our is an ethos of security and
privacy by design
When we design or select technologies, products
and services for our customers, we consider their
likely information security impact on our customers’
environment, and incorporate security and measures
to enable protection to the desired level.
An inclusive approach
All organisations are different. There is no one-size-
fits-all solution when it comes to formulating a
appropriate information security approach for
your business. At Canon, our approach is to
work closely with our customers to build better
information security together.
Satisfy the information security expectations of:
• Shareholders
• Staff
• Customers
• Suppliers
• Partners
• Guests
• Channel Partners
• Contractors

Más contenido relacionado

Más de Canon Business CEE

Más de Canon Business CEE (19)

Evolution of the Digital Workplace - Office Insights 2018
Evolution of the Digital Workplace - Office Insights 2018Evolution of the Digital Workplace - Office Insights 2018
Evolution of the Digital Workplace - Office Insights 2018
 
Océ VarioPrint 6000 TITAN
Océ VarioPrint 6000 TITANOcé VarioPrint 6000 TITAN
Océ VarioPrint 6000 TITAN
 
Canon обновляет широкоформатные МФУ начального уровня
Canon обновляет широкоформатные МФУ начального уровняCanon обновляет широкоформатные МФУ начального уровня
Canon обновляет широкоформатные МФУ начального уровня
 
Sell out presentation of Canon varioPRINT 140 series
Sell out presentation of Canon varioPRINT 140 seriesSell out presentation of Canon varioPRINT 140 series
Sell out presentation of Canon varioPRINT 140 series
 
Canon varioPRINT 140 series
Canon varioPRINT 140 seriesCanon varioPRINT 140 series
Canon varioPRINT 140 series
 
Canon imageRUNNER C3025i Press Release_Canon CEE
Canon imageRUNNER C3025i Press Release_Canon CEECanon imageRUNNER C3025i Press Release_Canon CEE
Canon imageRUNNER C3025i Press Release_Canon CEE
 
Canon image formula DR-M260 – безграничные возможности сканирования и обработ...
Canon image formula DR-M260 – безграничные возможности сканирования и обработ...Canon image formula DR-M260 – безграничные возможности сканирования и обработ...
Canon image formula DR-M260 – безграничные возможности сканирования и обработ...
 
Government-owned company almost halves printing costs by migrating to uniFLOW...
Government-owned company almost halves printing costs by migrating to uniFLOW...Government-owned company almost halves printing costs by migrating to uniFLOW...
Government-owned company almost halves printing costs by migrating to uniFLOW...
 
Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...
Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...
Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...
 
Oil industry managed print sevices - (NIS case study) - Canon CEE
Oil industry managed print sevices - (NIS case study) - Canon CEEOil industry managed print sevices - (NIS case study) - Canon CEE
Oil industry managed print sevices - (NIS case study) - Canon CEE
 
Experience uniFLOW IT Admin - Canon CEE
Experience uniFLOW IT Admin - Canon CEEExperience uniFLOW IT Admin - Canon CEE
Experience uniFLOW IT Admin - Canon CEE
 
Experience uniFLOW executive - Canon CEE
Experience uniFLOW executive - Canon CEEExperience uniFLOW executive - Canon CEE
Experience uniFLOW executive - Canon CEE
 
Experience uniFLOW enduser - Canon CEE
Experience uniFLOW enduser - Canon CEEExperience uniFLOW enduser - Canon CEE
Experience uniFLOW enduser - Canon CEE
 
A scalable print management solution boosts labor productivity and improves d...
A scalable print management solution boosts labor productivity and improves d...A scalable print management solution boosts labor productivity and improves d...
A scalable print management solution boosts labor productivity and improves d...
 
Streamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEEStreamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEE
 
Optimise your payment processes - Canon CEE
Optimise your payment processes - Canon CEEOptimise your payment processes - Canon CEE
Optimise your payment processes - Canon CEE
 
Risk and compliance as a business strengh - Canon CEE
Risk and compliance as a business strengh - Canon CEERisk and compliance as a business strengh - Canon CEE
Risk and compliance as a business strengh - Canon CEE
 
Understand mobile working - Canon CEE
Understand mobile working - Canon CEEUnderstand mobile working - Canon CEE
Understand mobile working - Canon CEE
 
The impact of accelerated Cash Flow visibility - Canon CEE
The impact of accelerated Cash Flow visibility - Canon CEEThe impact of accelerated Cash Flow visibility - Canon CEE
The impact of accelerated Cash Flow visibility - Canon CEE
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #6 Secure data through the life of devices

  • 1. SECURE DATA THROUGH THE LIFE OF DEVICES 8 WAYS TO PROTECT THE DATA IN YOUR OFFICE #6
  • 2. At any point in time, multifunctional devices used for printing, scanning, copying and faxing may contain, within them, large amounts of data that should be protected – from print jobs waiting to be printed, to received faxes, scanned data, address books, activity logs and job history. CANON SOLUTIONS HDD SECURE DATA ERASE DATA REMOVAL SERVICE REMOVABLE HARDDRIVEKIT INTELLECTUAL PROPERTY CONTROL POLICY The Risks Unless appropriate procedures are put in place, there is a risk that any device removed from premises, for whatever reason, may contain precious information. Organisations that use office equipment want to know that any confidential information held on devices during their operation is removed or destroyed in order to avoid heavy fines or damage to brand reputation from data leaks. #6 SECURE DATA THROUGH THE LIFE OF DEVICES YOUROPTIONS Formalise data destruction policies during the life of a device Remove hard disk drives during use with Canon’s removable hard disk drive kit* Erase sensitive data in real time with Canon’s hard disk secure data erase tool Ensure data stored in devices is removed at end of life with Canon’s data removal service Canon devices protect data at each stage of the device life-cycle to safeguard confidentiality and integrity, ensuring the availability of data is maintained. DEVICE LIFE CYCLE BEFORE USE Configure devices against a security hardening profile aligned to your risk appetite How? Canon hardening guide and PDI configuration services IN USE Ensure any data created, published and stored during operation is kept safe How? IP control policy, Removable hard drive, HDD secure data erase, Data encryption AFTER USE Prevent data resident on devices and their hard drives from falling into the wrong hands How? Data removal service for end-of-life devices *HDD available with specific devices only Secure Data Through the Life of Devices 32 Secure Data Through the Life of Devices
  • 3. Keep device hard disks in a safe place when not in use. REMOVABLE HARD DRIVE KIT INTELLECTUAL PROPERTY CONTROL POLICY As part of our Intellectual Property Control Policy, no hard disk drive will be removed without confirmation from an authorised responsible user. As it always remains the responsibility of the information owner to correctly destroy data at the end of its life, the user may wish to retain the hard disk drive. These arrangements can be discussed and formalised in property control policies that Canon can implement as part of a Managed Print Service. The optional kit allows the removal of a hard disk for storage in a secure location. The hard disk can be removed and reinstalled easily and securely. Once installed, it is secured by padlock. When the HDD Mirroring Kit or HDD Data Encryption & Mirroring Kit is used with the Removable HDD Kit, you can store the same data on two hard disks and you can encrypt the data and store the hard disks in a safe place. It is important for organisations to consider data destruction at (1) the end of the device life, (2) an in-service failure or (3) as part of a device movement. WHY USE IT? This feature provides another layer of data security for government agencies, corporate offices, law firms, financial institutions, and other organisations that need to ensure that data stored on the hard disk is physically secured when the unit is not in use. IN USE IN USE Secure Data Through the Life of Devices 54 Secure Data Through the Life of Devices
  • 4. HDD SECURE DATA ERASE IT’S REAL TIME Real time erasure of sensitive data stored on hard disk drive of the device produced during copying, printing, scanning and faxing is possible and can prevent the reprinting of materials. PREVENTS A DATA TRAIL Secure data erase provides an additional level of assurance by removing or protecting data at rest on the MFD. Without this functionality enabled only the pointer to the data is deleted and not the actual data itself. THE FOLLOWING DATA IS COMPLETELY ERASED: • Image data created when scanning • Temporary data created when using the Remote or Cascade Copying mode • Data that remained after you deleted a document in an inbox • Sent and received fax/I-fax data • Spooled data • Data temporarily stored as print data If the HDD Secure Data Erase option is enabled, data is automatically and completely erased when it is deleted from the hard disk and ensures that no data remains. You can select the Erase mode and timing for erasing data from the hard disk. Canon offers a comprehensive service to help protect sensitive information by removing all user data from redundant, end-of-life print devices. A number of options are available based on customer requirements and regional regulations. DATA REMOVAL SERVICE For each Canon MFD that is used for the output of sensitive material, we recommend the use of the Canon Hard Disk Drive (HDD) Secure Data Erase option. Ensure sensitive data is removed permanently from end-of-life devices AFTER USE Hard Disk Erase to DoD standard Device Inspection and certification Hard Disk Removal and hand over to customer Device Inspection and certification Hard Disk Removal and safe disposal in line with WEEE directive Device Inspection and certification 1 2 3 IN USE 6 Secure Data Through the Life of Devices Secure Data Through the Life of Devices 7
  • 5. Canon Europe Ltd 3 The Square, Stockley Park, Uxbridge, Middlesex UB11 1ET UK Canon U.K. Ltd Woodhatch Reigate Surrey RH2 8BF UK Canon Inc. Canon.com Canon Europe canon-europe.com English Edition © Canon Europa N.V., 2017 INTERESTED? There is no fool-proof plug and play office security solution. Every business has to determine what represents an acceptable level of risk. Canon is a pro-active partner to businesses seeking to keep data safe as part of a resilient enterprise information security policy. One voice Our information security team is responsible for both Canon’s internal information security, and the advice and solutions we offer to our customer. Our is an ethos of security and privacy by design When we design or select technologies, products and services for our customers, we consider their likely information security impact on our customers’ environment, and incorporate security and measures to enable protection to the desired level. An inclusive approach All organisations are different. There is no one-size- fits-all solution when it comes to formulating a appropriate information security approach for your business. At Canon, our approach is to work closely with our customers to build better information security together. Satisfy the information security expectations of: • Shareholders • Staff • Customers • Suppliers • Partners • Guests • Channel Partners • Contractors