AMENDMENT #47 T-437A 06-X COPIER HARD DRIVE SECURITY -AGENCY RESPONSIBILITIES AND PROCEDURES -CONTRACTOR OPTIONS AND PRICING INFORMATION

Size: px
Start display at page:

Download "AMENDMENT #47 T-437A 06-X-37720 COPIER HARD DRIVE SECURITY -AGENCY RESPONSIBILITIES AND PROCEDURES -CONTRACTOR OPTIONS AND PRICING INFORMATION"

Transcription

1 State of New Jersey DEPARTMENT OF THE TREASURY CHRIS CHRISTIE DIVISION OF PURCHASE AND PROPERTY ANDREW P. SIDAMON-ERISTOFF Governor PURCHASE BUREAU State Treasurer P. O. BOX 230 KIM GUADAGNO Trenton, New Jersey Lt. Governor AMENDMENT #47 T-437A 06-X COPIER HARD DRIVE SECURITY -AGENCY RESPONSIBILITIES AND PROCEDURES -CONTRACTOR OPTIONS AND PRICING INFORMATION TO: All State Agencies and Political Subdivisions DATE: 10/20/10 FROM: Alan Krupa, Senior Buyer Purchase Bureau SUBJECT: Copiers, Digital, Laser, Multi-Function and Copy Center Cost Per Copy ORIGINAL CONTRACT PERIOD: 01/01/06-12/31/07 (2 YEARS) 1st EXTENSION: 01/01/08-12/31/08 (1 YEAR) 2 ND EXTENSION: 01/01/09 06/30/09 (6 MONTHS) 3 RD EXTENSION: 07/01/09 12/31/09 (6 MONTHS) 4 TH EXTENSION: 01/01/10 06/30/10 (6 MONTHS) 5 TH EXTENSION: 07/01/10 12/31/10 (6 MONTHS) The Cost Per Copy (CPC)contract is a rental agreement with the Contractor. The Contractor owns the copier and all accessories. The Using Agency is responsible for the electronic data contained on a CPC rental. The information and pricing contained in this Amendment #47 is provided as a source for ensuring data is secure at the time of retiring a machine and, if desired, while a machine is in use. If an Agency is holding a machine(s) because of the recent Purchase Bureau directive dated July 20, 2010, this Amendment supersedes that directive concerning T-437A rentals and Agencies can proceed with the process of securing data and returning machines to the Contractor. New Jersey Is An Equal Opportunity Employer Printed on Recycled Paper and Recyclable 1 of 45

2 July 20, 2010 directive from the Purchase Bureau: Effective immediately, and until further notice, all CPU s, laptops, servers or any other devices with image/data storage capabilities cannot be surplused, destroyed, or otherwise transferred out of your Department, Agency or Commission. Any equipment under this category must be securely held on location pending forthcoming guidance. This includes copiers and multi-function devices that include a hard drive. Please forward this notice to all IT personnel under your jurisdiction, and to any other personnel involved in the storage, handling, transfer, transportation or disposal aspect of these types of assets. Guy Bocage Acting Director NJ Purchase Bureau In this Amendment, options are provided by Contractors for such things as hard drive removal, deletion, encryption and overwriting. It is the responsibility of the Using Agency to ensure electronic data contained on copiers is secure. Refer to State of New Jersey IT Circular #152- Information Disposal and Media Sanitization (09-10-NJOIT) A price line will be added to each contract that must be used for any applicable hard drive security charges. Users should request written quotations for their files. The new contract line can be identified by the words Hard Drive Security in the line description. Refer to the applicable supplemental attachment for Amendment 47 for each respective contractor. Current Contractors #64038 Oce Imagistics #64039 Ikon Office Solutions #64040 Sharp Electronics #64041 Stewart Business Systems #64042 Xerox Corporation #64043 Lanier Worldwide Inc. #64044 Konica Minolta #64045 Canon USA Inc. #64046 Canon Business Solutions Inc. #64047 Oce North America Inc. #64048 Kyocera Mita America Inc. #65260 Image Systems For Business Hard Drive Security options will be included in any future contracts that have yet to be awarded. Please keep this amendment with your copy of the Notice of Award for future reference. PB 04/13/17 2 of 45

3 CHRIS CHRISTIE Governor KIM GUADAGNO Lt. Governor DEPARTMENT OF THE TREASURY DIVISION OF PURCHASE AND PROPERTY PURCHASE BUREAU P.O. BOX 230 TRENTON, NJ ANDREW P. SIDAMON-ERISTOFF State Treasurer SUPPLEMENT TO AMENDMENT #47 EFFECTIVE OCTOBER 20, 2010 CANON BUSINESS SOLUTIONS INC. #64046 T-437A COST PER COPY SOLICITATION 06-X The purpose of this notice is to provide guidance for the proper disposal or sanitization of copiers that have been rented or will be rented using the current Black and White CPC contract. It also helps ensure that the information contained on such media is completely expunged before it leaves the State of New Jersey s control. See State of New Jersey IT Circular #152- Information Disposal and Media Sanitization (09-10-NJOIT): Hard drive security varies by manufacturer/contractor. Users should review the information provided for each respective contractor. New Jersey State Agencies should use the new contract line that has been titled Hard Drive Security to pay for any additional charges related to hard drive security. Contractors should supply specific quotations on company letterhead for reference/audit purposes. Alan Krupa Senior Buyer Purchase Bureau New Jersey Is an Equal Opportunity Employer Printed on Recycled and Recyclable Paper 3 of 45

4 4 of 45

5 5 of 45

6 CHRIS CHRISTIE Governor KIM GUADAGNO Lt. Governor DEPARTMENT OF THE TREASURY DIVISION OF PURCHASE AND PROPERTY PURCHASE BUREAU P.O. BOX 230 TRENTON, NJ ANDREW P. SIDAMON-ERISTOFF State Treasurer SUPPLEMENT TO AMENDMENT #47 EFFECTIVE OCTOBER 20, 2010 CANON USA #64045 T-437A COST PER COPY SOLICITATION 06-X The purpose of this notice is to provide guidance for the proper disposal or sanitization of copiers that have been rented or will be rented using the current Black and White CPC contract. It also helps ensure that the information contained on such media is completely expunged before it leaves the State of New Jersey s control. See State of New Jersey IT Circular #152- Information Disposal and Media Sanitization (09-10-NJOIT): Hard drive security varies by manufacturer/contractor. Users should review the information provided for each respective contractor. New Jersey State Agencies should use the new contract line that has been titled Hard Drive Security to pay for any additional charges related to hard drive security. Contractors should supply specific quotations on company letterhead for reference/audit purposes. Alan Krupa Senior Buyer Purchase Bureau New Jersey Is an Equal Opportunity Employer Printed on Recycled and Recyclable Paper 6 of 45

7 7 of 45

8 8 of 45

9 CHRIS CHRISTIE Governor KIM GUADAGNO Lt. Governor DEPARTMENT OF THE TREASURY DIVISION OF PURCHASE AND PROPERTY PURCHASE BUREAU P.O. BOX 230 TRENTON, NJ ANDREW P. SIDAMON-ERISTOFF State Treasurer SUPPLEMENT TO AMENDMENT #47 EFFECTIVE OCTOBER 20, 2010 IKON CONTRACT #64039 T-437A COST PER COPY SOLICITATION 06-X The purpose of this notice is to provide guidance for the proper disposal or sanitization of copiers that have been rented or will be rented using the current Black and White CPC contract. It also helps ensure that the information contained on such media is completely expunged before it leaves the State of New Jersey s control. See State of New Jersey IT Circular #152- Information Disposal and Media Sanitization (09-10-NJOIT): Hard drive security varies by manufacturer/contractor. Users should review the information provided for each respective contractor. New Jersey State Agencies should use the new contract line that has been titled Hard Drive Security to pay for any additional charges related to hard drive security. Contractors should supply specific quotations on company letterhead for reference/audit purposes. Alan Krupa Senior Buyer Purchase Bureau New Jersey Is an Equal Opportunity Employer Printed on Recycled and Recyclable Paper 9 of 45

10 Joseph Archut Government and Education Team Manager IKON Office Solutions, Inc. Suite # 500, 640 Freedom Business Center King of Prussia, PA jarchut@ikon.com July 8, 2010 Re: NJ Contract (T437A, T437C and T2075) Hard Drive Security Issue Alan Krupa State of NJ, Department of the Treasury Division of Purchase and Property 33 West State Street Trenton, NJ Dear Mr. Krupa, This letter is in response to your request for information dated 7/27/2010 relative to copier hard drives for copiers placed against any of these contracts. For currently placed models that have hard drives and for units obtained in the future we offer a hard drive overwrite or removal at the end of the term. The removed hard drive would be turned over to the agency or Poli-Sub for destruction. The removal is the surest way to guarantee the destruction of any confidential material stored on these hard drives. The cost for this removal is: IKON is willing to do this for no additional charge for any agency replacing a current IKON copier with a new IKON copier. If the Agency or Poli-Sub is at the end of their contract term and are not replacing the copier with another copier from IKON we will perform this service for a reduced charge of $ per system. For new equipment orders; agencies and Poli-Subs can choose to elect the Hard Drive Removal at the end of the term or they may choose to: Add an optional Security System for on the fly overwriting of the hard drive. This would be a good option for new units because it not only solves the end of term issue but adds an extra layer of security as the hard drive could never be read even if stolen or somehow compromised prior to the end of term. IKON would provide this option for new placements for an additional $4.84 per month on top of the current monthly base charge. IKON is offering these options for all copier placement scenarios and placement methods. If you have any questions, please do not hesitate to call. Sincerely, Joseph Archut Joseph Archut Government Team Manager 10 of 45

11 Hard Drive Removal: This is the surest and least expensive method of guaranteeing the safety of confidential material already stored on the hard drives of existing copiers in the field. An IKON Technician will remove the existing copier hard drive and turn it over to the state agency for destruction along with the destruction of other computer hard drives. Once returned to the IKON warehouse IKON will install a new hard drive in the used equipment. Once the hard drive is removed the copier will not function thus further guaranteeing confidentiality is protected. The hard drive removal will need to be coordinated closely to the delivery of the new copier. End of Term Hard Drive Overwrite: For some copiers in the field IKON can send a technician to overwrite the data at the end of the contract term. This is generally a one pass overwrite and will make information recovery by most data recovery companies practically impossible. It is believed (but widely debated) in the industry that a single pass with zeroes doesn t completely erase magnetic artifacts from a disk, and therefore is still possible to recover the data from the drive. This type of recovery would require the use of specialized and very expensive equipment like an electron microscope, and significant technical knowledge. Once the data is overwritten, the copier must be shutdown to prevent further use to make sure confidential material is not added to the hard drive prior to pick up. Ongoing Overwrite and Encryption: For new placements IKON recommends state agencies consider adding an optional Data Overwrite Security System. Ricoh s Data Overwrite Security System destroys latent digital images stored on the MFP s hard drive by writing over the image with random sequences of 1 s and 0 s. A simple display panel icon provides visual feedback regarding the overwrite process, e.g., completed or in-process. The three pass data overwrite process makes any effort to access and reconstruct stored print/copy files virtually impossible and conforms to National Security Agency recommended methods of managing classified information. They are certified to an EAL of of 45

12 CHRIS CHRISTIE Governor KIM GUADAGNO Lt. Governor DEPARTMENT OF THE TREASURY DIVISION OF PURCHASE AND PROPERTY PURCHASE BUREAU P.O. BOX 230 TRENTON, NJ ANDREW P. SIDAMON-ERISTOFF State Treasurer SUPPLEMENT TO AMENDMENT #47 EFFECTIVE OCTOBER 20, 2010 KONICA MINOLTA #64044 T-437A COST PER COPY SOLICITATION 06-X The purpose of this notice is to provide guidance for the proper disposal or sanitization of copiers that have been rented or will be rented using the current Black and White CPC contract. It also helps ensure that the information contained on such media is completely expunged before it leaves the State of New Jersey s control. See State of New Jersey IT Circular #152- Information Disposal and Media Sanitization (09-10-NJOIT): Hard drive security varies by manufacturer/contractor. Users should review the information provided for each respective contractor. New Jersey State Agencies should use the new contract line that has been titled Hard Drive Security to pay for any additional charges related to hard drive security. Contractors should supply specific quotations on company letterhead for reference/audit purposes. Alan Krupa Senior Buyer Purchase Bureau New Jersey Is an Equal Opportunity Employer Printed on Recycled and Recyclable Paper 12 of 45

13 Konica Minolta bizhub Hard Drive Security Konica Minolta bizhub MFP s have built in Hard Disk Drive security. Once a print is finished, the information is immediately and automatically erased from the HDD and RAM memory. Other built in security features include: HDD Auto Deletion- The copier can be set to erase all information on the HDD after preselected tiime intervals. In this scenario, all user boxes will also be erased. Hard Drive Overwrite- This is the most widely used method of HDD security. The Konica Minolta bizhub devices can be set to overwrite erased data up to 8 times, 4X more than what is required by the National Security Agency. The instructions for turning this on can be found in the operator s manual. HDD Password Protection- When enabled through the adminstrator s functions, a 20 digit alphanumeric password is set for the HDD. Once set, if the hard drive is removed from the machine it will no longer work. The instructions for turning this on can be found in the operator s manual. Konica Minolta also has a HDD encryption kit available if there is concern that the HDD may be hacked while on the network. This encryption kit can be purchased for about $250 (depending on model). Konica Minolta can wipe the HDD for you for a flat fee of $275. If the end user would like to keep the HDD at the end of service or when moving the machine to another location, Konica Minolta will provide a price on a case by case basis. Konica Minolta Business Solutions USA, Inc Washington Blvd., Suite 450 Arlington, VA of 45

14 CHRIS CHRISTIE Governor KIM GUADAGNO Lt. Governor DEPARTMENT OF THE TREASURY DIVISION OF PURCHASE AND PROPERTY PURCHASE BUREAU P.O. BOX 230 TRENTON, NJ ANDREW P. SIDAMON-ERISTOFF State Treasurer SUPPLEMENT TO AMENDMENT #47 EFFECTIVE OCTOBER 20, 2010 IMAGE SYSTEMS FOR BUSINESS #65260 T-437A COST PER COPY SOLICITATION 06-X The purpose of this notice is to provide guidance for the proper disposal or sanitization of copiers that have been rented or will be rented using the current Black and White CPC contract. It also helps ensure that the information contained on such media is completely expunged before it leaves the State of New Jersey s control. See State of New Jersey IT Circular #152- Information Disposal and Media Sanitization (09-10-NJOIT): Hard drive security varies by manufacturer/contractor. Users should review the information provided for each respective contractor. New Jersey State Agencies should use the new contract line that has been titled Hard Drive Security to pay for any additional charges related to hard drive security. Contractors should supply specific quotations on company letterhead for reference/audit purposes. Alan Krupa Senior Buyer Purchase Bureau New Jersey Is an Equal Opportunity Employer Printed on Recycled and Recyclable Paper 14 of 45

15 15 of 45

16 CHRIS CHRISTIE Governor KIM GUADAGNO Lt. Governor DEPARTMENT OF THE TREASURY DIVISION OF PURCHASE AND PROPERTY PURCHASE BUREAU P.O. BOX 230 TRENTON, NJ ANDREW P. SIDAMON-ERISTOFF State Treasurer SUPPLEMENT TO AMENDMENT #47 EFFECTIVE OCTOBER 20, 2010 OCE IMAGISTICS #64038 T-437A COST PER COPY SOLICITATION 06-X The purpose of this notice is to provide guidance for the proper disposal or sanitization of copiers that have been rented or will be rented using the current Black and White CPC contract. It also helps ensure that the information contained on such media is completely expunged before it leaves the State of New Jersey s control. See State of New Jersey IT Circular #152- Information Disposal and Media Sanitization (09-10-NJOIT): Hard drive security varies by manufacturer/contractor. Users should review the information provided for each respective contractor. New Jersey State Agencies should use the new contract line that has been titled Hard Drive Security to pay for any additional charges related to hard drive security. Contractors should supply specific quotations on company letterhead for reference/audit purposes. Alan Krupa Senior Buyer Purchase Bureau New Jersey Is an Equal Opportunity Employer Printed on Recycled and Recyclable Paper 16 of 45

17 Océ North America Policy on Customer Data Security for Returned Equipment Océ North America ( Océ ) 100 Oakview Drive Trumbull, CT The purpose of Océ North America Policy on Customer Data Security for Returned Equipment ( Policy ) is to describe for the customer the options that are currently available for securing customer s data on any Océ equipment that 1) contains a hard disk drive and 2) is returned to Océ. It is the responsibility of the customer to ensure that customer s data is handled in accordance with customer s requirements and/or internal policies and procedures prior to pick-up and return of any Océ equipment containing a hard disk drive. Océ shall not be liable for the release or disclosure of, or failure to destroy, customer data that has not been handled in accordance with this Policy or customer s own standard practices and/or internal policies for handling such data. In connection with office printing equipment: To protect the security of Customer data upon pickup and return of Océ equipment with hard disk drives to Océ, the Customer must exercise one of the following three Options: 1. Customers that have purchased security software/hardware, or units that contain any of the following can manage their own data needs: Deletion The hard disk drive directory is deleted making data unrecoverable by any users through the devices control panel, however if the hard drive is removed from the unit, 3rd party recovery software could be used to reconstruct the data. Encryption - End user data is secured against unauthorized viewing through the device control panel, or if the drive is removed. The encryption key password must be activated and not be released by the Customer to insure data integrity. Overwrite - Data is overwritten a minimum of 3 times to insure the data is unrecoverable from the device control panel, or if the drive is removed. The above will enable the Customer to determine the level of security required without intervention from Océ, and to complete sanitization of data prior to pick-up. The procedures should be outlined in the applicable User Manual, and if not, please contact your sales representative. If not included in the original sale, Customers may purchase available security software/hardware for their own use at an additional charge. 2. Customers that have purchased, or will purchase, available security software/hardware, or units that contain hard disk drive Deletion, Encryption or Océ HD Data Security Policy Rev. 6/3/ of 45

18 Overwrite capabilities and require that an Océ technician complete the procedure at the Customer s location can schedule a specific service call before the equipment is returned. There is an additional charge for this service. 3. Customers that require removal and retention of the hard disk drives by an Océ technician can schedule a specific service call before the equipment is returned. There is an additional charge for this service. To support Customer requirements, Océ offers the above options. Unless Customer properly uses an Océ provided Overwrite capability as set forth in Option 1 (if available); requests the Overwrite capability in Option 2 (if available), or requests Option 3, Océ makes no representation as to the destruction of Customer data on returned equipment; and Océ shall not be liable for the release or disclosure of, or failure to destroy, Customer data. In connection with production printing equipment: The following option is available to Océ customers in order to protect the security of customer data that may be located on the hard disk drive of any Océ production printing equipment that has been returned to Océ: For production printing equipment customers, at the time that customer informs Océ that the equipment will be returned to Océ and if customer is concerned about sensitive data on the original hard disk, it is the customer s responsibility to purchase from Océ a replacement hard drive for the Océ equipment. At the time of de-installation, the original hard disk will be removed from the Océ equipment and given to the customer. It is the customer s responsibility to dispose of the original hard drive according to customer s internal policies and procedures governing such disposal. In connection with wide format printing equipment: As a standard practice, Océ electronically cleans all images located on the hard disk drives of returned wide format equipment. Océ also strongly recommends that customers scrub data from the hard disk of all equipment prior to the equipment leaving the customer site as Océ does not accept any responsibility for the security of data remaining on the equipment. Océ offers the following options for customers wishing to protect the security of data on hard disk drives prior to releasing the equipment from the customer site: 1. Customer may purchase from Océ a removable hard drive that has dual images from Océ. The standard image is in the printer at all times and only removed when necessary to print all sensitive data (which is stored on the second hard drive). Hard drives are changed as needed. The standard image is returned to Océ with the Océ Océ HD Data Security Policy Rev. 6/3/ of 45

19 equipment, and the customer retains the removable hard drive containing the sensitive data. 2. Customer may purchase an Océ Power Logic controller with the electronic shredding option. Océ HD Data Security Policy Rev. 6/3/ of 45

20 CHRIS CHRISTIE Governor KIM GUADAGNO Lt. Governor DEPARTMENT OF THE TREASURY DIVISION OF PURCHASE AND PROPERTY PURCHASE BUREAU P.O. BOX 230 TRENTON, NJ ANDREW P. SIDAMON-ERISTOFF State Treasurer SUPPLEMENT TO AMENDMENT #47 EFFECTIVE OCTOBER 20, 2010 KYOCERA MITA AMERICA INC. #64048 T-437A COST PER COPY SOLICITATION 06-X The purpose of this notice is to provide guidance for the proper disposal or sanitization of copiers that have been rented or will be rented using the current Black and White CPC contract. It also helps ensure that the information contained on such media is completely expunged before it leaves the State of New Jersey s control. See State of New Jersey IT Circular #152- Information Disposal and Media Sanitization (09-10-NJOIT): Hard drive security varies by manufacturer/contractor. Users should review the information provided for each respective contractor. New Jersey State Agencies should use the new contract line that has been titled Hard Drive Security to pay for any additional charges related to hard drive security. Contractors should supply specific quotations on company letterhead for reference/audit purposes. Alan Krupa Senior Buyer Purchase Bureau New Jersey Is an Equal Opportunity Employer Printed on Recycled and Recyclable Paper 20 of 45

21 KYOCERA MITA AMERICA, INC. 225 SAND ROAD, P.O. BOX FAIRFIELD, NEW JERSEY (973) Kyocera National and Government Accounts In recent weeks, news reports about Multifunctional Products (MFPs) and data security have prompted customers to ask questions regarding the security of their document imaging devices. The information in this document is for Kyocera National and Government Account Customers and pertains to Kyocera MFPs and Printers that have Hard Disk Drives (HDD) installed. The disk drives in these products are similar to the HDDs found in personal computers which retain certain processed data. If a model does not have an HDD, customer document data (not device information) is cleared from memory when the device is turned off. Kyocera Mita America is committed to delivering the most reliable and secure MFPs and Printers for our customers, and recognizes the importance of data security. Security initiatives and risk management for any organization can be unique, and depending on customer requirements, a number of alternatives exist to assist in meeting compliance and organizational objectives. I. Hard Disk Drive Reformat MFP/Printer End of Life Options The least costly alternative for any National and Government Account Customer is the Hard Disk Drive Reformat capability that is standard on all HDD-equipped MFPs and Printers. This alternative is ideal for customers with low-priority security issues based on their daily workflow, however, this option should not be considered an absolute data recovery deterrent. The following alternatives and the required steps explain how this can be accomplished. A. HDD Reformat by Customer (must be at the device) 1. Customer calls the Kyocera Hotline at to speak to an authorized technician. 2. Report the model and serial number to technician. 3. While at the device, the technician will walk caller through the necessary steps to reformat the HDD. 4. The procedure could take approximately 40 minutes, depending on the amount of data stored on the HDD. 5. At the end of the procedure, a message will appear on-screen that the reformat is complete. 6. Device should be taken out of service and officially retired. Continued use of the device after the reformat procedure will require the reformat procedure to be repeated. 21 of 45

22 B. HDD Reformat by Authorized Dealer 1. Customer will contact their Kyocera National or Government Account Manager (NAM/GAM). 2. NAM/GAM will coordinate service call for HDD Reformat with authorized servicing dealer. 3. Dealer will contact customer to set appointment. 4. A fee of $ (per device) will be charged for this service. II. Hard Disk Drive Remove and Replace For some National and Government Account Customers, a stronger deterrent and means to protect data may be required. For these organizations, at the end of product life, an authorized servicing dealer can remove the HDD from the device at the customer s location and replace it with a new HDD. A. Remove and Replace HDD by Dealer 1. Customer will contact Kyocera NAM/GAM to place order for removal and replacement of the HDD. 2. NAM/GAM will coordinate service call for Hard Disk Drive Remove and Replace with authorized servicing dealer. 3. Dealer will contact customer to set appointment. 4. A fee of $ per device will be charged for the service call, plus the cost of a hard drive (see attached). 5. During the service call, the existing HDD will be removed and given to the customer, and a new HDD will be installed. 6. The HDD removed belongs to the customer at that point, and it is the customer s responsibility to take care of it according to their own security guidelines. 7. The device is taken out of service and officially retired. Continued use after this procedure is at the customer s liability and responsibility. Any deviation from this plan and procedure is not recommended by Kyocera and is at the customer s responsibility. MFP/Printer Current Installation Options III. Addition of a Data Security Kit Kyocera Mita offers optional Data Security Kits for HDD-equipped MFPs and Printers for enhanced security for all National and Government Accounts. All Kyocera data security kits include a 3x overwrite feature; and once installed, the overwrite procedure occurs after the completion of any print, scan, copy or fax job. This procedure is accomplished on the drive sector used for data processing. During this process, data is overwritten and destroyed to prevent recovery and breach. In automatic mode, customer interaction is not required. 22 of 45

23 23 of 45

24 June 18, 2010 Hard Drive/Data Security Kit Pricing MODELS SUGGESTED HDD / DATA AND RETAIL SECURITY KIT ACCESSORIES DESCRIPTION PRICE PRICING TASKalfa P.P.M. Digital Copier with standard 300 sheet paper drawer HD-5A 40.0 GB Hard Disk Drive Unit for Printer $ $ 194 TASKalfa P.P.M. Digital Copier with standard 300 x 2 sheet paper drawers HD-5A 40.0 GB Hard Disk Drive Unit for Printer $ $ 194 STRATOS KM C.P.M. Digital Copier with duplexing (Std. Print/Scan/Copy) Data Security Kit C HDD Erase Kit for Copy/Print $ $ 335 HDD-Part # 7NH3M080G002H01 (1) 80GB HDD $ 383 KM C.P.M. Digital Copier with duplexing (Std.Copy) HD-ME GB Hard Disk Drive Unit for Printer $ $ 277 KM C.P.M. Digital Copier with duplexing (Std. Print/Scan/Copy) Data Security Kit C HDD Erase Kit for Copy/Print $ $ 335 HDD-Part # 7NH3M080G002H01 (1) 80GB HDD $ 383 TASKalfa 300i 30 PPM Monochrome MFP Data Security Kit E HDD Erase Kit for Copy/Print $ $ 335 HDD-Part # 302K (1) 160GB HDD $ 231 KM-2530/3530/ /35/40 C.P.M. Digital Copier HD-ME GB HDD for Printer $ $ 277 KM C.P.M. Digital Copier HD-ME GB HDD for Printer $ $ 277 KM C.P.M. Digital Copier HD-ME GB HDD for Printer $ $ 277 FALCON 2's KM C.P.M. Digital Copier with duplexing HD-70 HDD for Copier $ $ 202 HD-ME GB Hard Disk Drive Unit $ $ 277 KM C.P.M. Digital Copier with duplexing HD-70 HDD for Copier $ $ 202 HD-ME GB Hard Disk Drive Unit $ $ 277 KM C.P.M. Digital Copier with duplexing HD-70 HDD for Copier $ $ 202 HD-ME GB Hard Disk Drive Unit $ $ 277 FALCON 3's KM C.P.M. Digital Copier with duplexing (Std. Print/Scan/Copy) Data Security Kit C HDD Erase Kit for Copy/Print $ $ 335 HDD-Part # 7NH3M040G001H01 (1) 40GB HDD $ 375 KM C.P.M. Digital Copier with duplexing (Std. Print/Scan/Copy) Data Security Kit C HDD Erase Kit for Copy/Print $ $ 335 HDD-Part # 7NH3M040G001H01 (1) 40GB HDD $ 375 KM C.P.M. Digital Copier with duplexing (Std. Print/Scan/Copy) Data Security Kit C HDD Erase Kit for Copy/Print $ $ 335 HDD-Part # 7NH3M040G001H01 (1) 40GB HDD $ of 45

25 June 18, 2010 Hard Drive/Data Security Kit Pricing MODELS SUGGESTED HDD / DATA AND RETAIL SECURITY KIT ACCESSORIES DESCRIPTION PRICE PRICING FALCON 4's TASKalfa 420i 42 PPM Monochrome MFP Data Security Kit E HDD Erase Kit for Copy/Print $ $ 335 HDD-Part # 302KS93060 (1) 160GB HDD $ 427 TASKalfa 520i 52 PPM Monochrome MFP Data Security Kit E HDD Erase Kit for Copy/Print $ $ 335 HDD-Part # 302KS93060 (1) 160GB HDD $ 427 KM C.P.M. Digital Copier Data Security Kit (B) HDD Erase Kit for Copy/Print $ $ 231 HD-ME GB Hard Disk Drive Unit for Printer $ $ 277 KM C.P.M. Digital Copier HD-ME GB Hard Disk Drive Unit $ $ 277 KM C.P.M. Digital Copier Data Security Kit (B) HDD Erase Kit for Copy/Print $ $ 231 HD-ME GB Hard Disk Drive Unit for Printer $ $ 277 TASKalfa C.P.M. Monochrome MFP Data Security Kit (B) HDD Erase Kit for Copy/Print $ $ 231 HD-10 HDD for Printer $ $ 349 TASKalfa C.P.M. Monochrome MFP Data Security Kit (B) HDD Erase Kit for Copy/Print $ $ 231 HD-10 HDD for Printer $ $ 349 COLOR KM-C /25 C.P.M. Digital Color MFP with standard PCL Print, Scan, I FAX KM-C /32 C.P.M. Digital Color MFP with standard PCL Print, Scan, I FAX KM-C /32 C.P.M. Digital Color MFP with standard PCL Print, Scan, I FAX Data Security (D) Data Security $ $ 231 HD-5 HDD for Printer (40GB) $ $ 277 VOYAGER 1.5 KM-C2525E (Color) 25/25 C.P.M. Digital Color MFP with standard PCL/PS Print, Scan KM-C2525E (B/W) 25/25 C.P.M. Digital Color MFP with standard PCL/PS Print, Scan KM-C3225E (Color) KM-C3225E (B/W) 25/32 C.P.M. Digital Color MFP with standard PCL/PS Print, Scan 25/32 C.P.M. Digital Color MFP with standard PCL/PS Print, Scan KM-C3232E (Color) KM-C3232E (B/W) 32/32 C.P.M. Digital Color MFP with standard PCL/PS Print, Scan 32/32 C.P.M. Digital Color MFP with standard PCL/PS Print, Scan KM-C4035E (Color) 35/40 C.P.M. Digital Color MFP with standard PCL/PS Print, Scan KM-C4035E (B/W) 35/40 C.P.M. Digital Color MFP with standard PCL/PS Print, Scan Data Security (D) Data Security $ $ 231 HD-ME GB Hard Disk Drive Unit for Printer $ $ of 45

26 June 18, 2010 Hard Drive/Data Security Kit Pricing MODELS SUGGESTED HDD / DATA AND RETAIL SECURITY KIT ACCESSORIES DESCRIPTION PRICE PRICING TASKalfa ci TASKalfa250ci (Color) 25/25 C.P.M. Digital Color MFP with standard PCL/PS Print, Scan TASKalfa300ci (Color) 30/30 C.P.M. Digital Color MFP with standard PCL/PS Print, Scan TASKalfa400ci (Color) 40/40 C.P.M. Digital Color MFP with standard PCL/PS Print, Scan TASKalfa500ci (Color) 50/40 C.P.M. Digital Color MFP with standard PCL/PS Print, Scan Data Security (E) Data Security $ $ 335 HDD-Part # 302JZ93160 (1) 160GB HDD [TA250ci/300ci Only] $ 276 HDD-Part # 302H (2) 160GB HDD [TA400ci/500ci Only] $ 558 TASKalfa552ci (Color) 55/50 C.P.M. Digital Color MFP with standard PCL/PS Print, Scan Data Security (E) Data Security $ $ 335 HDD-Part # 302H (2) 160GB HDD $ 558 PRINTERS FS-2020D 37 PPM Laser Printer FS-3920DN 42 PPM Laser Printer FS-4020DN 47 PPM Laser Printer HD-5A 40.0 GB Hard Disk Drive Unit for Printer $ $ 237 FS-C8100DN 32 PPM Color Laser Printer Data Security (D) Data Security $ $ 231 HD-ME GB Hard Disk Drive Unit for Printer $ $ 277 FS-C8500DN 55/50 PPM Color Printer Data Security Kit E HDD Erase Kit for Copy/Print $ $ 335 HDD-Part # 302K (1) 160GB HDD $ 231 FS-9120DN 36 PPM Modular Laser Printing System FS-9520DN 51 PPM Modular Laser Printing System HD-ME GB Hard Disk Drive Unit $ $ 277 FS-9130DN 40 PPM Modular Laser Printing System FS-9530DN 51 PPM Modular Laser Printing System Data Security Kit C HDD Erase Kit for Copy/Print $ $ 335 HD-ME GB Hard Disk Drive Unit for Printer $ $ of 45

27 CHRIS CHRISTIE Governor KIM GUADAGNO Lt. Governor DEPARTMENT OF THE TREASURY DIVISION OF PURCHASE AND PROPERTY PURCHASE BUREAU P.O. BOX 230 TRENTON, NJ ANDREW P. SIDAMON-ERISTOFF State Treasurer SUPPLEMENT TO AMENDMENT #47 EFFECTIVE OCTOBER 20, 2010 LANIER #64043 T-437A COST PER COPY SOLICITATION 06-X The purpose of this notice is to provide guidance for the proper disposal or sanitization of copiers that have been rented or will be rented using the current Black and White CPC contract. It also helps ensure that the information contained on such media is completely expunged before it leaves the State of New Jersey s control. See State of New Jersey IT Circular #152- Information Disposal and Media Sanitization (09-10-NJOIT): Hard drive security varies by manufacturer/contractor. Users should review the information provided for each respective contractor. New Jersey State Agencies should use the new contract line that has been titled Hard Drive Security to pay for any additional charges related to hard drive security. Contractors should supply specific quotations on company letterhead for reference/audit purposes. Alan Krupa Senior Buyer Purchase Bureau New Jersey Is an Equal Opportunity Employer Printed on Recycled and Recyclable Paper 27 of 45

28 Alan Krupa State of New Jersey Department of the Treasury Purchase Bureau PO Box 230 Trenton, NJ Alan, Options for Hard Drive Security Ricoh s Data Overwrite Security System* (DOSS) option offers added security to all types of customer mission critical documents and proprietary information. The DOSS option overwrites temporary data stored on the system s internal hard disk drive by using a three pass overwrite process of random sequences of 1s and 0s, making it incredibly difficult to reconstruct images or files. T437A T437C Band Model DOSS Band Model DOSS 1 Lanier LD533SP (3351Sp) $ Lanier LD528C $ Lanier LD140SP (4001SP) $ Lanier LD528C $ Lanier LD360 (6001) $ Lanier LD528C $ Lanier LD370 (7001) $ Lanier LD528C $ Lanier LD370 (7001) $ Lanier LD528C $ Lanier LD380 (8001) $ Lanier LD533C $ Lanier LD380 (8001) $ Lanier LD550C $ Lanier LD380 (8001) $ Lanier LD540C $ Lanier LD380 (8001) $ Lanier LD365C $ Lanier Pro907EX $ Lanier LD365C $ Lanier Pro907EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ of 45

29 Ricoh's Hard Drive Surrender Program option is only available for models that will support hard drive technology. The HD Surrender Option includes all labor and any materials required. Under this option Ricoh would surrender the Hard Drive prior to the unit being removed from the Agency or Eligible Entity. T437A Band Model HD Surrender T437C 1 Lanier LD533SP (3351Sp) $ 8.37 Band Model HD Surrender 1 Lanier LD528SP $ Lanier LD528C $ Lanier LD140SP (4001SP) $ Lanier LD528C $ Lanier LD140SP $ Lanier LD528C $ Lanier LD360 (6001) $ Lanier LD528C $ Lanier LD150SP $ Lanier LD528C $ Lanier LD370 (7001) $ Lanier LD533C $ Lanier LD370 (7001) $ Lanier LD550C $ Lanier LD380 (8001) $ Lanier LD540C $ Lanier LD380 (8001) $ Lanier LD365C $ Lanier LD380 (8001) $ Lanier LD365C $ Lanier LD380 (8001) $ Lanier Pro907EX $ Lanier Pro907EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ of 45

30 Ricoh's Hard Drive Encryption* option provides security for information that needs to be stored on the MFP or printer and reused again. Examples of information that may need to be stored for reuse include administrator and user passwords and address books. The Hard Drive Encryption Option differs from DOSS in that the information encrypted is not destroyed, but locked up so only authorized users may access the information. DOSS destroys data so it cannot be reused. The Hard Drive Encryption Option and DOSS may be used in conjunction and will not interfere with MFP or printer operation. T437A T437C Band Model HD Encryption Band Model HD Encryption 1 Lanier LD533SP (3351Sp) $ Lanier LD528C $ Lanier LD528SP $ Lanier LD528C $ Lanier LD140SP (4001SP) $ Lanier LD528C $ Lanier LD140SP $ Lanier LD528C $ Lanier LD360 (6001) $ Lanier LD528C $ Lanier LD150SP $ Lanier LD533C $ Lanier LD370 (7001) $ Lanier LD550C $ Lanier LD370 (7001) $ Lanier LD540C $ Lanier LD380 (8001) $ Lanier LD365C $ Lanier LD380 (8001) $ Lanier LD365C $ Lanier LD380 (8001) $ Lanier LD380 (8001) $ Lanier Pro907EX $ Lanier Pro907EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ Lanier Pro1107EX $ 4.84 *Ricoh has the ability to add both Data Overwrite and Hard Drive Encryption on units already installed. Ricoh would only charge the State of New Jersey $120/hr if the customer decides to install these security options 30 of 45

31 CHRIS CHRISTIE Governor KIM GUADAGNO Lt. Governor DEPARTMENT OF THE TREASURY DIVISION OF PURCHASE AND PROPERTY PURCHASE BUREAU P.O. BOX 230 TRENTON, NJ ANDREW P. SIDAMON-ERISTOFF State Treasurer SUPPLEMENT TO AMENDMENT #47 EFFECTIVE OCTOBER 20, 2010 OCE NORTH AMERICA #64047 T-437A COST PER COPY SOLICITATION 06-X The purpose of this notice is to provide guidance for the proper disposal or sanitization of copiers that have been rented or will be rented using the current Black and White CPC contract. It also helps ensure that the information contained on such media is completely expunged before it leaves the State of New Jersey s control. See State of New Jersey IT Circular #152- Information Disposal and Media Sanitization (09-10-NJOIT): Hard drive security varies by manufacturer/contractor. Users should review the information provided for each respective contractor. New Jersey State Agencies should use the new contract line that has been titled Hard Drive Security to pay for any additional charges related to hard drive security. Contractors should supply specific quotations on company letterhead for reference/audit purposes. Alan Krupa Senior Buyer Purchase Bureau New Jersey Is an Equal Opportunity Employer Printed on Recycled and Recyclable Paper 31 of 45

32 Océ North America Policy on Customer Data Security for Returned Equipment Océ North America ( Océ ) 100 Oakview Drive Trumbull, CT The purpose of Océ North America Policy on Customer Data Security for Returned Equipment ( Policy ) is to describe for the customer the options that are currently available for securing customer s data on any Océ equipment that 1) contains a hard disk drive and 2) is returned to Océ. It is the responsibility of the customer to ensure that customer s data is handled in accordance with customer s requirements and/or internal policies and procedures prior to pick-up and return of any Océ equipment containing a hard disk drive. Océ shall not be liable for the release or disclosure of, or failure to destroy, customer data that has not been handled in accordance with this Policy or customer s own standard practices and/or internal policies for handling such data. In connection with office printing equipment: To protect the security of Customer data upon pickup and return of Océ equipment with hard disk drives to Océ, the Customer must exercise one of the following three Options: 1. Customers that have purchased security software/hardware, or units that contain any of the following can manage their own data needs: Deletion The hard disk drive directory is deleted making data unrecoverable by any users through the devices control panel, however if the hard drive is removed from the unit, 3rd party recovery software could be used to reconstruct the data. Encryption - End user data is secured against unauthorized viewing through the device control panel, or if the drive is removed. The encryption key password must be activated and not be released by the Customer to insure data integrity. Overwrite - Data is overwritten a minimum of 3 times to insure the data is unrecoverable from the device control panel, or if the drive is removed. The above will enable the Customer to determine the level of security required without intervention from Océ, and to complete sanitization of data prior to pick-up. The procedures should be outlined in the applicable User Manual, and if not, please contact your sales representative. If not included in the original sale, Customers may purchase available security software/hardware for their own use at an additional charge. 2. Customers that have purchased, or will purchase, available security software/hardware, or units that contain hard disk drive Deletion, Encryption or Océ HD Data Security Policy Rev. 6/3/ of 45

33 Overwrite capabilities and require that an Océ technician complete the procedure at the Customer s location can schedule a specific service call before the equipment is returned. There is an additional charge for this service. 3. Customers that require removal and retention of the hard disk drives by an Océ technician can schedule a specific service call before the equipment is returned. There is an additional charge for this service. To support Customer requirements, Océ offers the above options. Unless Customer properly uses an Océ provided Overwrite capability as set forth in Option 1 (if available); requests the Overwrite capability in Option 2 (if available), or requests Option 3, Océ makes no representation as to the destruction of Customer data on returned equipment; and Océ shall not be liable for the release or disclosure of, or failure to destroy, Customer data. In connection with production printing equipment: The following option is available to Océ customers in order to protect the security of customer data that may be located on the hard disk drive of any Océ production printing equipment that has been returned to Océ: For production printing equipment customers, at the time that customer informs Océ that the equipment will be returned to Océ and if customer is concerned about sensitive data on the original hard disk, it is the customer s responsibility to purchase from Océ a replacement hard drive for the Océ equipment. At the time of de-installation, the original hard disk will be removed from the Océ equipment and given to the customer. It is the customer s responsibility to dispose of the original hard drive according to customer s internal policies and procedures governing such disposal. In connection with wide format printing equipment: As a standard practice, Océ electronically cleans all images located on the hard disk drives of returned wide format equipment. Océ also strongly recommends that customers scrub data from the hard disk of all equipment prior to the equipment leaving the customer site as Océ does not accept any responsibility for the security of data remaining on the equipment. Océ offers the following options for customers wishing to protect the security of data on hard disk drives prior to releasing the equipment from the customer site: 1. Customer may purchase from Océ a removable hard drive that has dual images from Océ. The standard image is in the printer at all times and only removed when necessary to print all sensitive data (which is stored on the second hard drive). Hard drives are changed as needed. The standard image is returned to Océ with the Océ Océ HD Data Security Policy Rev. 6/3/ of 45

34 equipment, and the customer retains the removable hard drive containing the sensitive data. 2. Customer may purchase an Océ Power Logic controller with the electronic shredding option. Océ HD Data Security Policy Rev. 6/3/ of 45

35 CHRIS CHRISTIE Governor KIM GUADAGNO Lt. Governor DEPARTMENT OF THE TREASURY DIVISION OF PURCHASE AND PROPERTY PURCHASE BUREAU P.O. BOX 230 TRENTON, NJ ANDREW P. SIDAMON-ERISTOFF State Treasurer SUPPLEMENT TO AMENDMENT #47 EFFECTIVE OCTOBER 20, 2010 SHARP ELECTRONICS #64040 T-437A COST PER COPY SOLICITATION 06-X The purpose of this notice is to provide guidance for the proper disposal or sanitization of copiers that have been rented or will be rented using the current Black and White CPC contract. It also helps ensure that the information contained on such media is completely expunged before it leaves the State of New Jersey s control. See State of New Jersey IT Circular #152- Information Disposal and Media Sanitization (09-10-NJOIT): Hard drive security varies by manufacturer/contractor. Users should review the information provided for each respective contractor. New Jersey State Agencies should use the new contract line that has been titled Hard Drive Security to pay for any additional charges related to hard drive security. Contractors should supply specific quotations on company letterhead for reference/audit purposes. Alan Krupa Senior Buyer Purchase Bureau New Jersey Is an Equal Opportunity Employer Printed on Recycled and Recyclable Paper 35 of 45

36 SHARP ELECTRONICS CORPORATION Sharp Plaza P.O. Box B Mahwah, NJ James Driscoll, Government Account Manager Bus July 30, 2010 SHARP ELECTRONICS CORP. NJ STATE CONTRACT - T437A T437C T2075 Hard Disk Drive Data Security Clarification Sharp offers a broad array of standard and optional security features that are designed to help you protect your confidential and private information. To address the specific issue of image data on the hard drive, Sharp offers the optional Data Security Kit, which when equipped on the MFP provides additional security, including the following two key steps: 1. All data on the Hard Drive is stored in an encrypted format. 2. Once the job is complete, the data is overwritten up to seven (7) times. This can be done after every job, when the machine is turned on or on demand. If used correctly, this process renders the data on the drive virtually unrecoverable. If customers choose not to purchase a Sharp Data Security Kit, Sharp strongly recommends that at the end of the product life, you purchase a new Hard Drive for your MFP and retain and destroy the original Hard Drive that contains your confidential information. While many people have considered reformatting the Hard Drive as a measure to protect the information on the drive, we do not recommend this method as a secure alternative to protect the confidentiality of your information. In order to complete any of these actions, please contact your Sharp Authorized Service Provider. A list of Sharp copiers and their corresponding Data Security Kits, as well as the cost of the Hard Disk Removal is attached. 36 of 45

Hard Drive Data Security. Chris Bilello Director, Business Development Konica Minolta Business Solutions U.S.A., Inc.

Hard Drive Data Security. Chris Bilello Director, Business Development Konica Minolta Business Solutions U.S.A., Inc. Hard Drive Data Security Chris Bilello Director, Business Development Konica Minolta Business Solutions U.S.A., Inc. Konica Minolta Security Features On April 19, CBS News aired a story that highlighted

More information

Ricoh Security Solutions Comprehensive protection for your documents and information. ecure. proven. trusted

Ricoh Security Solutions Comprehensive protection for your documents and information. ecure. proven. trusted Ricoh Security Solutions Comprehensive protection for your documents and information ecure proven trusted RICOH Security Solutions Depend on Ricoh for comprehensive document security. RICOH understands

More information

This is an example of MFP password entry in the administration mode for hard-disk protection:

This is an example of MFP password entry in the administration mode for hard-disk protection: Data security Hard disk password protection The built-in hard disk of the MFP is automatically protected by a password. This password is stored in the hard disk BIOS and prevents access to the hard disk

More information

Enabling bizhub HDD Security Features

Enabling bizhub HDD Security Features Hard Disk Drive Security Enabling bizhub HDD Security Features bizhub C652/C552/C452 bizhub C360/C280/C220 bizhub 423/363/283/223 1 Enabling bizhub HDD Security - Overview This guide is intended to assist

More information

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Data

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Data User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Data Security Kit Outline How do you protect your critical

More information

Copier Data Security:

Copier Data Security: Copier Data Security: A Guide for Businesses Federal Trade Commission business.ftc.gov Does your company keep sensitive data Social Security numbers, credit reports, account numbers, health records, or

More information

Copier Data Security:

Copier Data Security: Copier Data Security: A Guide for Businesses Federal Trade Commission business.ftc.gov Does your company keep sensitive data Social Security numbers, credit reports, account numbers, health records, or

More information

Copier & MFD under ISO 15408 scheme. 28 th, September, 2005 Konica Minolta Business Technologies. Inc. Takashi Ito

Copier & MFD under ISO 15408 scheme. 28 th, September, 2005 Konica Minolta Business Technologies. Inc. Takashi Ito Copier & MFD under ISO 15408 scheme 28 th, September, 2005 Konica Minolta Business Technologies. Inc. Takashi Ito Contents Copier & MFD; its Market and CC Certification Growth of copier/mfd market (1)

More information

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Outline How do you protect your critical confidential data?

More information

Canon imagerunner Hard Disk Drive Data Security Options. Data Encryption and Overwrite

Canon imagerunner Hard Disk Drive Data Security Options. Data Encryption and Overwrite Canon imagerunner Hard Disk Drive Data Security Options Data Encryption and Overwrite Canon imagerunner Hard Disk Drive Data Security Kits Powerful protection for your most important information. Canon

More information

SECURITY. Konica Minolta s industry-leading security standards SECURITY

SECURITY. Konica Minolta s industry-leading security standards SECURITY Konica Minolta s industry-leading security standards In the digital age, we have seen global communications undergo unprecedented growth and the potential for security breaches has grown in parallel. In

More information

Information Security Policy

Information Security Policy Information Security Policy Contents Version: 1 Contents... 1 Introduction... 2 Anti-Virus Software... 3 Media Classification... 4 Media Handling... 5 Media Retention... 6 Media Disposal... 7 Service Providers...

More information

Lexmark Printers and Multifunction Products: Hard Disk and Non-Volatile Memory Guide

Lexmark Printers and Multifunction Products: Hard Disk and Non-Volatile Memory Guide Lexmark Printers and Multifunction Products: Hard Disk and Non-Volatile Memory Guide This guide applies to the following Lexmark devices: Printers C780 C782 C935 T640 T642 T644 Multifunction Products X646

More information

The main difference between environments is the level of accountability for individual user actions.

The main difference between environments is the level of accountability for individual user actions. All users identified / authenticated Stronger document security Complete audit logs ENVIRONMENT A All users identified / authenticated Normal document security Exception / violation logging ENVIRONMENT

More information

Xerox Product Security

Xerox Product Security Version 1.0 May 7, 2010 Xerox Product Security Data Protection: Image Overwrite, and Removal Disclaimer The information provided in this Xerox Product Response is provided "as is" without warranty of any

More information

IMAGER security solutions. Protect Your Business with Sharp s Comprehensive Document Security Solutions

IMAGER security solutions. Protect Your Business with Sharp s Comprehensive Document Security Solutions IMAGER security solutions TM Protect Your Business with Sharp s Comprehensive Document Security Solutions Sharp. Leading the industry with the first Common Criteria Validated Solution for document and

More information

HP FutureSmart Firmware Device Hard Disk Security

HP FutureSmart Firmware Device Hard Disk Security HP FutureSmart Firmware Device Hard Disk Security Summary: This document discusses hard disk security for HP FutureSmart Firmware printing devices. Contents: Overview... 2 Secure Erase Commands... 2 1.

More information

DATA SECURITY INFORMATION COMMON CRITERIA ISO-IEC15408

DATA SECURITY INFORMATION COMMON CRITERIA ISO-IEC15408 DATA SECURITY INFORMATION COMMON CRITERIA ISO-IEC1408 TASKALFA 61ci/71ci REV-1.1 /March 201 ~ K!::IDCERa Document Solutions Contents Information Data Security Kit E IEEE 2600-1 TASKALFA 61 ci/71 ci 1.

More information

Xerox WorkCentre 4260 vs. Samsung SCX-6555N. Competitive Assessment. WorkCentre 4260 Multifunction Printer. Competitive Assessment

Xerox WorkCentre 4260 vs. Samsung SCX-6555N. Competitive Assessment. WorkCentre 4260 Multifunction Printer. Competitive Assessment WorkCentre 4260 Multifunction Printer Competitive Assessment Xerox vs. Samsung Competitive Assessment This document has been prepared from data prepared by Buyers Laboratory Inc. (BLI), the imaging industry

More information

Security Solutions. Concerned about information security? You should be!

Security Solutions. Concerned about information security? You should be! Security Solutions Concerned about information security? You should be! Various security threats surrounding the office Ricoh s proposal for a security management system. Information technology is the

More information

Legal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

DEPARTMENT OF HOMELAND SECURITY. U.S. Customs and Border Protection. Notice of Issuance of Final Determination Concerning

DEPARTMENT OF HOMELAND SECURITY. U.S. Customs and Border Protection. Notice of Issuance of Final Determination Concerning This document is scheduled to be published in the Federal Register on 01/06/2016 and available online at http://federalregister.gov/a/2015-33245, and on FDsys.gov DEPARTMENT OF HOMELAND SECURITY U.S. Customs

More information

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as required by HIPAA. 1. Definitions. a. Business Associate, as used in this Contract, means the

More information

Hard Drive Retention Offering for Xerox Products in the United States

Hard Drive Retention Offering for Xerox Products in the United States Hard Drive Retention Offering for Xerox Products in the United States November 19, 2013 2013 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the

More information

Simple defence for your business

Simple defence for your business Simple defence for your business SECURITY Canon (UK) Ltd Woodhatch, Reigate Surrey RH2 8BF Telephone No: 08000 353535 Facsimile No: 01737 220022 www.canon.co.uk Canon Ireland Arena Road, Sandyford Industrial

More information

Product Security. Data Protection: Image Overwrite, Encryption and Disk Removal

Product Security. Data Protection: Image Overwrite, Encryption and Disk Removal Product Security Data Protection: Image, Encryption and Disk Removal Version 10.2 July 14, 2016 Disclaimer The information provided in this Xerox Product Response is provided "as is" without warranty of

More information

Office Equipment Disposal Policy

Office Equipment Disposal Policy Office Equipment Disposal Policy R ISK MANAGEMENT HANDOUTS OF L AWYERS MUTUAL LAWYERS MUTUAL LIABILITY INSURANCE COMPANY OF NORTH CAROLINA 5020 Weston Parkway, Suite 200, Cary, North Carolina 27513 Post

More information

University of Wisconsin-Madison Policy and Procedure

University of Wisconsin-Madison Policy and Procedure Page 1 of 6 I. Policy UW-Madison strives to ensure the privacy and security of all patient/clients protected health information in the maintenance, retention, and eventual destruction/disposal of such

More information

Form #57, Revision #4 Date 7/15/2015 Data Destruction and Sanitation Program. Mobile (ON-SITE) Data Destruction/Shredding Services

Form #57, Revision #4 Date 7/15/2015 Data Destruction and Sanitation Program. Mobile (ON-SITE) Data Destruction/Shredding Services Data Destruction and Sanitation Program Mobile (ON-SITE) Data Destruction/Shredding Services 1 Diversified Recycling utilizes state of the art equipment for their data destruction and eradication services.

More information

Secure Installation and Operation of Your Xerox Multi-Function Device. Version 1.0 August 6, 2012

Secure Installation and Operation of Your Xerox Multi-Function Device. Version 1.0 August 6, 2012 Secure Installation and Operation of Your Xerox Multi-Function Device Version 1.0 August 6, 2012 Secure Installation and Operation of Your Xerox Multi-Function Device Purpose and Audience This document

More information

User s Guide [Security Operations]

User s Guide [Security Operations] User s Guide [Security Operations] 010. 6 Ver. 1.01 Contents 1 Security 1.1 Introduction... 1- Compliance with the ISO15408 Standard... 1- Operating Precautions... 1- INSTALLATION CHECKLIST... 1-3 1. Security

More information

im5530 / im6030 / im7230 / im8530 For Océ and Imagistics Models

im5530 / im6030 / im7230 / im8530 For Océ and Imagistics Models Océ Scanning Guide im5530 / im6030 / im7230 / im8530 For Océ and Imagistics Models SOFTWARE LICENSE AGREEMENT INSTALLING OR OTHERWISE USING THIS SOFTWARE PRODUCT CONSTITUTES YOUR ACCEPTANCE OF THE FOLLOWING

More information

SECURITY WITHOUT SACRIFICE

SECURITY WITHOUT SACRIFICE SECURITY WITHOUT SACRIFICE Konica Minolta security standards INFORMATION SECURITY Industry-leading standard security In the digital age, we have seen global communications undergo unparalleled growth and

More information

NHS Information Governance:

NHS Information Governance: NHS Information Governance: Information Risk Management Guidance: Maintenance and Secure Disposal of Digital Printers, Copiers and Multi Function Devices Department of Health Informatics Directorate July

More information

THE OFFICE PRODUCTS ANALYST A monthly publication devoted to the cost performance analysis of office products

THE OFFICE PRODUCTS ANALYST A monthly publication devoted to the cost performance analysis of office products PAGE 1 Volume 36, Issue 5 Industry Analysts, Inc. 2012 A monthly publication devoted to the cost performance analysis of office products MFP Reliability Survey Results Inside this issue: Methodology...

More information

Product Security Data Protection: Image Overwrite, Encryption and Disk Removal. Version 10.1 October 22. 2015

Product Security Data Protection: Image Overwrite, Encryption and Disk Removal. Version 10.1 October 22. 2015 Product Security Data Protection: Image Overwrite, and Removal Version 10.1 October 22. 2015 Disclaimer The information provided in this Xerox Product Response is provided "as is" without warranty of

More information

Printers copiers & MFDs

Printers copiers & MFDs Printers copiers & MFDs Printers copiers & MFDs savings reliability environment Things to consider when buying Cost The ongoing running costs of printers, copiers and MFDs is often overlooked when making

More information

www.konicaminolta.co.uk Office system bizhub 250 bizhub 250 Compact creativity

www.konicaminolta.co.uk Office system bizhub 250 bizhub 250 Compact creativity www.konicaminolta.co.uk Office system bizhub 250 bizhub 250 Compact creativity Office system bizhub 250 Creative answers to black-and-white requirements Resourcefulness for your office A compact and robust

More information

Reform PDC Document Workflow Solution Streamline capture and distribution. intuitive. lexible. mobile

Reform PDC Document Workflow Solution Streamline capture and distribution. intuitive. lexible. mobile Reform PDC Document Workflow Solution Streamline capture and distribution intuitive lexible mobile Reform PDC Innovation and convenience to maximize efficiency. Your organization is unique so is its document

More information

REVISION: This directive supersedes TSA MD 3700.4, Handling Sensitive Personally Identifiable Information, dated March 13, 2008.

REVISION: This directive supersedes TSA MD 3700.4, Handling Sensitive Personally Identifiable Information, dated March 13, 2008. OFFICE OF THE SPECIAL COUNSELOR Privacy TSA MANAGEMENT DIRECTIVE No. 3700.4 To enhance mission performance, TSA is committed to promoting a culture founded on its values of Integrity, Innovation and Team

More information

SeCUritY. Safeguarding information Within Documents and Devices. imagerunner ADVANCE Solutions. ADVANCE to Canon MFP security solutions.

SeCUritY. Safeguarding information Within Documents and Devices. imagerunner ADVANCE Solutions. ADVANCE to Canon MFP security solutions. imagerunner ADVANCE Solutions SeCUritY Safeguarding information Within Documents and Devices ADVANCE to Canon MFP security solutions. Whether your business relies on paper documents, electronic documents,

More information

Approved By: Agency Name Management

Approved By: Agency Name Management Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the

More information

SafeCom Smart Printing Administrator s Quick Guide

SafeCom Smart Printing Administrator s Quick Guide SafeCom Smart Printing Administrator s Quick Guide D10600-08 March 2012 Trademarks: SafeCom, SafeCom Go, SafeCom P:Go, SafeCom epay and the SafeCom logo are trademarks of SafeCom a/s. Company and product

More information

HIPAA Training for Staff and Volunteers

HIPAA Training for Staff and Volunteers HIPAA Training for Staff and Volunteers Objectives Explain the purpose of the HIPAA privacy, security and breach notification regulations Name three patient privacy rights Discuss what you can do to help

More information

Computrace Agent Quick Reference and Best Practices Guide

Computrace Agent Quick Reference and Best Practices Guide Computrace Agent Quick Reference and Best Practices Guide www.absolute.com May 14, 2008 Absolute Software Computrace Agent Quick Reference and Best Practices Guide This document, as well as the software

More information

Mac Driver 3. Software Information. Version 1.1

Mac Driver 3. Software Information. Version 1.1 Mac Driver 3 Software Information Version 1.1 Contents I. Overview... 1 II. New Functions/New User Interface... 2 1. Output... 3 2. Finishing... 4 3. Booklet/Folding... 4 4. Imaging... 5 5. Adjustment...

More information

UMBC POLICY ON ELECTRONIC MEDIA DISPOSAL UMBC# X-1.00.05

UMBC POLICY ON ELECTRONIC MEDIA DISPOSAL UMBC# X-1.00.05 UMBC POLICY ON ELECTRONIC MEDIA DISPOSAL UMBC# X-1.00.05 I. POLICY STATEMENT Increasing amounts of electronic data are being transmitted and stored on computer systems and electronic media by virtually

More information

PageScope Enterprise Suite: interlocking solutions to manage your printer and MFP fleet more productively.

PageScope Enterprise Suite: interlocking solutions to manage your printer and MFP fleet more productively. PageScope Enterprise Suite gives you a powerful set of management tools to get a grip on managing print output, tracking costs and accounts, authenticating users, even customizing individual preferences

More information

November 13, 2013. Original Proposal Submission Due Date: December 03, 2013 (2:00 p.m. EST) ADDENDUM #1

November 13, 2013. Original Proposal Submission Due Date: December 03, 2013 (2:00 p.m. EST) ADDENDUM #1 CHRIS CHRISTIE Governor KIM GUADAGNO Lt. Governor DEPARTMENT OF THE TREASURY DIVISION OF PURCHASE AND PROPERTY PROCUREMENT BUREAU PO BOX 230 TRENTON, NJ 08625-0230 November 13, 2013 ANDREW P. SIDAMON-ERISTOFF

More information

Stopping Leaks: How to Confront the Challenges of Endpoint Information Security from HDD. Whitepaper

Stopping Leaks: How to Confront the Challenges of Endpoint Information Security from HDD. Whitepaper Stopping Leaks: How to Confront the Challenges of Endpoint Information Security from HDD intimus consulting is a division of the MARTIN YALE GROUP Bergheimer Strasse 6-12 88677 Markdorf / Germany www.intimusconsulting.com

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

Australasian Information Security Evaluation Program

Australasian Information Security Evaluation Program Australasian Information Security Evaluation Program Certification Report Certificate Number: 2010/71 10 Dec 2010 Version 1.0 Commonwealth of Australia 2010. Reproduction is authorised provided that the

More information

Evaluation. Common Criteria. Questions & Answers Xerox and Canon. Xerox Advanced Multifunction Systems

Evaluation. Common Criteria. Questions & Answers Xerox and Canon. Xerox Advanced Multifunction Systems Xerox Security Common Criteria Evaluation Questions & Answers Xerox and Canon Xerox Advanced Multifunction Systems WorkCentre M35/M45/M55 WorkCentre Pro 35/45/55/65/75/90 WorkCentre Pro C2128/C2636/C3545

More information

Security Recommendations for Multifunction Printers Will Urbanski, Virginia Tech IT Security Office and Lab

Security Recommendations for Multifunction Printers Will Urbanski, Virginia Tech IT Security Office and Lab Security Recommendations for Multifunction Printers Will Urbanski, Virginia Tech IT Security Office and Lab September, 2010 Security Recommendations for Multifunction Printers 2 Overview With the rise

More information

Understanding Data Destruction and How to Properly Protect Your Business

Understanding Data Destruction and How to Properly Protect Your Business Understanding Data Destruction and How to Properly Protect Your Business Understanding Data Destruction and How to Properly Protect Your Business I. Abstract This document is designed to provide a practical

More information

Copy Audit Touch Installation and Operating Guide

Copy Audit Touch Installation and Operating Guide Copy Audit Touch Installation and Operating Guide Overview The software and hardware combination for Copy Audit Touch allows you to track walk-up copying on your copiers and report it in the Print Audit

More information

Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods

Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods SECURIS SM Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods Information Systems Security Association (ISSA) Baltimore Chapter Monthly Meeting January 27, 2016 Hugh McLaurin, CSDS

More information

HIPAA Training for Hospice Staff and Volunteers

HIPAA Training for Hospice Staff and Volunteers HIPAA Training for Hospice Staff and Volunteers Hospice Education Network Objectives Explain the purpose of the HIPAA privacy and security regulations Name three patient privacy rights Discuss what you

More information

ADVANCED SOLUTIONS FOR. Financial Services. compliance and security effective cost control increased efficiency improved customer information

ADVANCED SOLUTIONS FOR. Financial Services. compliance and security effective cost control increased efficiency improved customer information ADVANCED SOLUTIONS FOR Financial Services compliance and security effective cost control increased efficiency improved customer information New solutions for today s financial services challenges. Processing

More information

PCI Data Security and Classification Standards Summary

PCI Data Security and Classification Standards Summary PCI Data Security and Classification Standards Summary Data security should be a key component of all system policies and practices related to payment acceptance and transaction processing. As customers

More information

User s Guide. Security Operations. 2013. 5 Ver. 1.02

User s Guide. Security Operations. 2013. 5 Ver. 1.02 User s Guide Security Operations 013. 5 Ver. 1.0 Contents 1 Security 1.1 Introduction... 1- Compliance with the ISO15408 Standard... 1- Operating Precautions... 1- INSTALLATION CHECKLIST... 1-3 1. Security

More information

As outlined in the legislation, the Study Commission shall develop a plan and may make legislative or other logistical recommendations for the

As outlined in the legislation, the Study Commission shall develop a plan and may make legislative or other logistical recommendations for the As part of the House Bill 699, which was passed during the last days of Ohio s 126th General Assembly, The Northeast Ohio Universities Collaboration and Innovation Study Commission was established. The

More information

SafeCom Smart Printing. Product Overview 40%

SafeCom Smart Printing. Product Overview 40% SafeCom Smart Printing Product Overview 40% Optimize print services and document security SafeCom Smart Printing provides the secure printing and document accounting solution most companies need to control

More information

TECHNOLOGY. Konica Minolta Office MFP Solutions. Innovation You Can Count On. office

TECHNOLOGY. Konica Minolta Office MFP Solutions. Innovation You Can Count On. office TECHNOLOGY Konica Minolta Office MFP Solutions. Innovation You Can Count On. office Innovation. With Konica Minolta, you will have innovative MFP solutions that give shape to ideas. Every Konica Minolta

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

you can count on! Develop s security standards

you can count on! Develop s security standards Security you can count on! Develop s security standards Industry-leading security standards In today s business company data has to cross a lot of different data highways. These different highways offer

More information

CITY UNIVERSITY OF HONG KONG. Information Classification and

CITY UNIVERSITY OF HONG KONG. Information Classification and CITY UNIVERSITY OF HONG KONG Handling Standard (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification

More information

Comodo Disk Encryption

Comodo Disk Encryption Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3

More information

Australasian Information Security Evaluation Program

Australasian Information Security Evaluation Program Australasian Information Security Evaluation Program Certification Report Certificate Number: 2009/54 2 June 2009 Version 1.0 Commonwealth of Australia 2009. Reproduction is authorised provided that the

More information

Combo KIT for 4150 Combo KIT CAPCOMBKT.X.RV.A.G 26,021 256 MB memory upgrade Kit 256 MB memory upgrade Kit CAPT256MB.X.RV.A.

Combo KIT for 4150 Combo KIT CAPCOMBKT.X.RV.A.G 26,021 256 MB memory upgrade Kit 256 MB memory upgrade Kit CAPT256MB.X.RV.A. Issued on 12.2.09 T1 Price List Q1'09 A4 Multi PE 220 Copier, Printer, Scanner & Fax PE220MFD0.X.C0.M.G 16,511 Functional Devices Workcentre 3119 Copier, Printer, Scanner WORKC3119.X.C0.M.G 10,792 Monochrome

More information

THE BIG GREEN PICTURE HOW KONICA MINOLTA INNOVATIONS, PROGRAMS & ENERGY-SAVING INITIATIVES PROTECT THE ENVIRONMENT FOR FUTURE GENERATIONS

THE BIG GREEN PICTURE HOW KONICA MINOLTA INNOVATIONS, PROGRAMS & ENERGY-SAVING INITIATIVES PROTECT THE ENVIRONMENT FOR FUTURE GENERATIONS THE BIG GREEN PICTURE HOW KONICA MINOLTA INNOVATIONS, PROGRAMS & ENERGY-SAVING INITIATIVES PROTECT THE ENVIRONMENT FOR FUTURE GENERATIONS At Konica Minolta, environmental protection is a top priority.

More information

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail.

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail. Why Zak Enterprises? Information contained on the hard drives of retired computers must be destroyed properly. Failure to do so can result in criminal penalties including fines and prison terms up to 20

More information

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for

More information

State of New Jersey DEPARTMENT OF BANKING AND INSURANCE PO BOX 325 TRENTON, NJ 08625-0325

State of New Jersey DEPARTMENT OF BANKING AND INSURANCE PO BOX 325 TRENTON, NJ 08625-0325 CHRIS CHRISTIE Governor KIM GUADAGNO Lt. Governor State of New Jersey DEPARTMENT OF BANKING AND INSURANCE PO BOX 325 TRENTON, NJ 08625-0325 TEL (609) 292-7272 THOMAS B. CONSIDINE Commissioner BULLETIN

More information

WHO SHOULD READ THIS POLICY

WHO SHOULD READ THIS POLICY NEW YORK UNIVERSITY Asset Management Policies & Procedures (October, 2010) POLICY STATEMENT New York University requires every school, department, or unit to acquire, record, inventory, and dispose of

More information

HIPAA Security Compliance for Konica Minolta bizhub MFPs

HIPAA Security Compliance for Konica Minolta bizhub MFPs HIPAA Security Compliance for Konica Minolta bizhub MFPs Table of Contents Introduction... 1 What is HIPAA?... 1 HIPAA Security Standards that are applicable to Konica Minolta bizhub Multi-Functional Printers...

More information

SOLUTIONS FOR LEGAL PROFESSIONALS

SOLUTIONS FOR LEGAL PROFESSIONALS SOLUTIONS FOR LEGAL PROFESSIONALS The verdict is in: legal professionals trust Konica Minolta. Our EnvisionIT Legal solutions assist legal departments of all sizes envision how they can work smarter and

More information

Asset Management Equipment Redeployment And Termination Services. A Service Offering From Data Center Assistance Group, Inc.

Asset Management Equipment Redeployment And Termination Services. A Service Offering From Data Center Assistance Group, Inc. DCAG Data Center Assistance Group, Inc. Revision Date: 5/20/2013 Asset Management Redeployment And Termination Services A Service Offering From Data Center Assistance Group, Inc. (DCAG) Prepared by: Thomas

More information

Information Security Policy

Information Security Policy Information Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED

More information

Standard Information Communications Technology. Multifunction Device. January 2013 Version 2.2. Department of Corporate and Information Services

Standard Information Communications Technology. Multifunction Device. January 2013 Version 2.2. Department of Corporate and Information Services Standard Information Communications Technology January 2013 Version 2.2 Corporate and Information Services Document details Document Title Contact details File name Version 2.2 Date issued January 2013

More information

Disposal of Electronic Devices. Office of General Services

Disposal of Electronic Devices. Office of General Services New York State Office of the State Comptroller Thomas P. DiNapoli Division of State Government Accountability Disposal of Electronic Devices Office of General Services Report 2012-S-4 December 2012 Executive

More information

O.R.C. 5120.01; 5120.22

O.R.C. 5120.01; 5120.22 STATE OF OHIO SUBJECT: PAGE 1 OF 7 Inventory, Donation, Transfer & Disposal of DRC IT Hardware & NUMBER: 05-OIT-21 Software RULE/CODE REFERENCE: O.R.C. 5120.01; 5120.22 SUPERSEDES: 05-OIT-21 dated 09/13/11

More information

HELPING CHURCHES BE GOOD STEWARDS OF THEIR RESOURCES

HELPING CHURCHES BE GOOD STEWARDS OF THEIR RESOURCES HELPING CHURCHES BE GOOD STEWARDS OF THEIR RESOURCES Canon Solutions America, endorsed by LifeWay as your source for multifunction printers and copiers, offers churches and Christian schools a convenient

More information

Privacy Policy. February, 2015 Page: 1

Privacy Policy. February, 2015 Page: 1 February, 2015 Page: 1 Revision History Revision # Date Author Sections Altered Approval/Date Rev 1.0 02/15/15 Ben Price New Document Rev 1.1 07/24/15 Ben Price Verify Privacy Grid Requirements are met

More information

INFORMATION SECURITY GUIDELINES

INFORMATION SECURITY GUIDELINES INFORMATION SECURITY GUIDELINES TABLE OF CONTENTS: Scope of Document 1 Data Definition Guidelines (Appendix 1).2 Data Protection Guidelines (Appendix 2).3 Protection of Electronic or Machine- Readable

More information

Securing MFPs in a CAC Environment: Today and Tomorrow Critical Considerations

Securing MFPs in a CAC Environment: Today and Tomorrow Critical Considerations WHITE PAPER Securing MFPs in a CAC Environment: Today and Tomorrow Critical Considerations Contents The Mandate for Increased Security...1 Key Considerations...1 Critical Security Level Considerations...1

More information

KMnet Admin ENTERPRISE DEVICE MANAGEMENT SOFTWARE ADVANCED DEVICE MANAGEMENT SOFTWARE.

KMnet Admin ENTERPRISE DEVICE MANAGEMENT SOFTWARE ADVANCED DEVICE MANAGEMENT SOFTWARE. KMnet Admin ENTERPRISE DEVICE MANAGEMENT SOFTWARE ADVANCED DEVICE MANAGEMENT SOFTWARE. FAST, SIMPLE NETWORK DEVICE MANAGEMENT. UNIFIED SOFTWARE TO MANAGE DEVICES AND NETWORKS KMnet Admin is Kyocera's unified

More information

Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data

Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data Printer Security Challenges Executive Summary Security breaches can damage both your operations

More information

Ephp System - Data Recovery Services

Ephp System - Data Recovery Services Dear Customer, Thank you for choosing easyservice Data Solutions. We are one of the leading providers of Data Recovery and Data safety solutions in New Jersey USA. We have had the privilege to serve thousands

More information

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 jmadeja@buchananassociates.com Each business is required by Massachusetts law

More information

CONTACT: Russell Marchetta Bratskeir & Co. (973) 882-2075 (212) 679-2233 russell.marchetta@ricoh-usa.com jgreen@bratskeir.com

CONTACT: Russell Marchetta Bratskeir & Co. (973) 882-2075 (212) 679-2233 russell.marchetta@ricoh-usa.com jgreen@bratskeir.com FOR IMMDEDIATE RELEASE CONTACT: Russell Marchetta Josh Green Savin Bratskeir & Co. (973) 882-2075 (212) 679-2233 russell.marchetta@ricoh-usa.com jgreen@bratskeir.com SAVIN INTRODUCES BLACK & WHITE DIGITAL

More information

Information Technology Acceptable Usage Policy

Information Technology Acceptable Usage Policy Information Technology Acceptable Usage Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly

More information

www.konicaminolta.co.uk Office system bizhub 750 bizhub 750 Black & White at high-speed & high-quality

www.konicaminolta.co.uk Office system bizhub 750 bizhub 750 Black & White at high-speed & high-quality www.konicaminolta.co.uk Office system bizhub 750 bizhub 750 Black & White at high-speed & high-quality Office system bizhub 750 Deadlines have to be met: Be prepared Speed isn t everything, but it makes

More information

DELAWARE PUBLIC ARCHIVES POLICY STATEMENT AND GUIDELINES MODEL GUIDELINES FOR ELECTRONIC RECORDS

DELAWARE PUBLIC ARCHIVES POLICY STATEMENT AND GUIDELINES MODEL GUIDELINES FOR ELECTRONIC RECORDS DELAWARE PUBLIC ARCHIVES POLICY STATEMENT AND GUIDELINES MODEL GUIDELINES FOR ELECTRONIC RECORDS STATEMENT OF PURPOSE The Delaware Public Archives (DPA) has issued "Model Guidelines for Electronic Records"

More information

Fundamentals of security. Information Security White Paper

Fundamentals of security. Information Security White Paper Fundamentals of security Information Security White Paper Security, Fundamentals of security Fundamentals of security This fundamentals of security guide is a living document this means it is continually

More information

**************** UNCLASSIFIED / **************** Precedence: ROUTINE DTG: 281759Z Aug 12 Originator: DON CIO WASHINGTON DC(UC) UNCLASSIFIED//

**************** UNCLASSIFIED / **************** Precedence: ROUTINE DTG: 281759Z Aug 12 Originator: DON CIO WASHINGTON DC(UC) UNCLASSIFIED// **************** UNCLASSIFIED / **************** Precedence: ROUTINE DTG: 281759Z Aug 12 Originator: DON CIO WASHINGTON DC(UC) UNCLASSIFIED// FROM: DON CIO WASHINGTON DC TO: ASN(M&RA) ASN(RD&A) ASN(EI&E)

More information

Sharpen your document and data security HP Security solutions for imaging and printing

Sharpen your document and data security HP Security solutions for imaging and printing Sharpen your document and data security HP Security solutions for imaging and printing Recognize hidden risks You know how valuable data is to your organization. But the more data you acquire and share,

More information