SlideShare a Scribd company logo
SECURE DATA
THROUGH
THE LIFE OF
DEVICES
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE
#6
At any point in time, multifunctional devices used for printing,
scanning, copying and faxing may contain, within them, large
amounts of data that should be protected – from print jobs
waiting to be printed, to received faxes, scanned data, address
books, activity logs and job history.
CANON SOLUTIONS
HDD SECURE
DATA ERASE
DATA REMOVAL
SERVICE
REMOVABLE
HARDDRIVEKIT
INTELLECTUAL
PROPERTY
CONTROL POLICY
The Risks
Unless appropriate procedures are
put in place, there is a risk that any
device removed from premises,
for whatever reason, may contain
precious information.
Organisations that use office equipment
want to know that any confidential
information held on devices during their
operation is removed or destroyed in
order to avoid heavy fines or damage
to brand reputation from data leaks.
#6 SECURE DATA
THROUGH THE
LIFE OF DEVICES
YOUROPTIONS
Formalise data
destruction policies
during the life of
a device
Remove hard disk
drives during use with
Canon’s removable
hard disk drive kit*
Erase sensitive data in
real time with Canon’s
hard disk secure data
erase tool
Ensure data stored in
devices is removed at
end of life with Canon’s
data removal service
Canon devices protect data at each
stage of the device life-cycle to
safeguard confidentiality and
integrity, ensuring the availability
of data is maintained.
DEVICE LIFE CYCLE
BEFORE USE
Configure devices against
a security hardening profile
aligned to your risk appetite
How?
Canon hardening guide and
PDI configuration services
IN USE
Ensure any data created,
published and stored during
operation is kept safe
How?
IP control policy, Removable
hard drive, HDD secure data
erase, Data encryption
AFTER USE
Prevent data resident on devices
and their hard drives from
falling into the wrong hands
How?
Data removal service for
end-of-life devices
*HDD available with specific devices only Secure Data Through the Life of Devices 32 Secure Data Through the Life of Devices
Keep device hard disks in a safe
place when not in use.
REMOVABLE
HARD DRIVE
KIT
INTELLECTUAL
PROPERTY
CONTROL
POLICY
As part of our Intellectual Property Control Policy,
no hard disk drive will be removed without
confirmation from an authorised responsible user.
As it always remains the responsibility of the
information owner to correctly destroy data at the
end of its life, the user may wish to retain the hard
disk drive. These arrangements can be discussed
and formalised in property control policies that Canon
can implement as part of a Managed Print Service.
The optional kit allows the removal of a hard disk for
storage in a secure location. The hard disk can be
removed and reinstalled easily and securely. Once
installed, it is secured by padlock.
When the HDD Mirroring Kit or HDD Data Encryption
& Mirroring Kit is used with the Removable HDD Kit,
you can store the same data on two hard disks and
you can encrypt the data and store the hard disks in
a safe place.
It is important for organisations
to consider data destruction at
(1) the end of the device life,
(2) an in-service failure or
(3) as part of a device movement.
WHY USE IT?
This feature provides another layer of data security
for government agencies, corporate offices, law firms,
financial institutions, and other organisations that
need to ensure that data stored on the hard disk is
physically secured when the unit is not in use.
IN USE IN USE
Secure Data Through the Life of Devices 54 Secure Data Through the Life of Devices
HDD SECURE
DATA ERASE
IT’S REAL TIME
Real time erasure of sensitive data stored on hard
disk drive of the device produced during copying,
printing, scanning and faxing is possible and can
prevent the reprinting of materials.
PREVENTS A DATA TRAIL
Secure data erase provides an additional level of
assurance by removing or protecting data at rest
on the MFD. Without this functionality enabled
only the pointer to the data is deleted and not the
actual data itself.
THE FOLLOWING DATA IS
COMPLETELY ERASED:
• Image data created when scanning
• Temporary data created when using the Remote
or Cascade Copying mode
• Data that remained after you deleted a
document in an inbox
• Sent and received fax/I-fax data
• Spooled data
• Data temporarily stored as print data
If the HDD Secure Data Erase option is enabled,
data is automatically and completely erased when
it is deleted from the hard disk and ensures that no
data remains. You can select the Erase mode and
timing for erasing data from the hard disk.
Canon offers a comprehensive service to help protect
sensitive information by removing all user data from
redundant, end-of-life print devices.
A number of options are available based on customer
requirements and regional regulations.
DATA REMOVAL
SERVICE
For each Canon MFD that is used
for the output of sensitive material,
we recommend the use of the
Canon Hard Disk Drive (HDD)
Secure Data Erase option.
Ensure sensitive data is removed
permanently from end-of-life devices
AFTER USE
Hard Disk Erase to DoD standard
Device Inspection and certification
Hard Disk Removal and hand over
to customer
Device Inspection and certification
Hard Disk Removal and safe disposal in
line with WEEE directive
Device Inspection and certification
1
2
3
IN USE
6 Secure Data Through the Life of Devices Secure Data Through the Life of Devices 7
Canon Europe Ltd
3 The Square,
Stockley Park,
Uxbridge,
Middlesex
UB11 1ET
UK
Canon U.K. Ltd
Woodhatch
Reigate
Surrey
RH2 8BF
UK
Canon Inc.
Canon.com
Canon Europe
canon-europe.com
English Edition
© Canon Europa N.V., 2017
INTERESTED?
There is no fool-proof plug and
play office security solution.
Every business has to determine
what represents an acceptable
level of risk.
Canon is a pro-active partner to
businesses seeking to keep data
safe as part of a resilient enterprise
information security policy.
One voice
Our information security team is responsible for
both Canon’s internal information security, and the
advice and solutions we offer to our customer.
Our is an ethos of security and
privacy by design
When we design or select technologies, products
and services for our customers, we consider their
likely information security impact on our customers’
environment, and incorporate security and measures
to enable protection to the desired level.
An inclusive approach
All organisations are different. There is no one-size-
fits-all solution when it comes to formulating a
appropriate information security approach for
your business. At Canon, our approach is to
work closely with our customers to build better
information security together.
Satisfy the information security expectations of:
• Shareholders
• Staff
• Customers
• Suppliers
• Partners
• Guests
• Channel Partners
• Contractors

More Related Content

More from Canon Business CEE

Evolution of the Digital Workplace - Office Insights 2018
Evolution of the Digital Workplace - Office Insights 2018Evolution of the Digital Workplace - Office Insights 2018
Evolution of the Digital Workplace - Office Insights 2018Canon Business CEE
 
Canon обновляет широкоформатные МФУ начального уровня
Canon обновляет широкоформатные МФУ начального уровняCanon обновляет широкоформатные МФУ начального уровня
Canon обновляет широкоформатные МФУ начального уровняCanon Business CEE
 
Sell out presentation of Canon varioPRINT 140 series
Sell out presentation of Canon varioPRINT 140 seriesSell out presentation of Canon varioPRINT 140 series
Sell out presentation of Canon varioPRINT 140 seriesCanon Business CEE
 
Canon imageRUNNER C3025i Press Release_Canon CEE
Canon imageRUNNER C3025i Press Release_Canon CEECanon imageRUNNER C3025i Press Release_Canon CEE
Canon imageRUNNER C3025i Press Release_Canon CEECanon Business CEE
 
Canon image formula DR-M260 – безграничные возможности сканирования и обработ...
Canon image formula DR-M260 – безграничные возможности сканирования и обработ...Canon image formula DR-M260 – безграничные возможности сканирования и обработ...
Canon image formula DR-M260 – безграничные возможности сканирования и обработ...Canon Business CEE
 
Government-owned company almost halves printing costs by migrating to uniFLOW...
Government-owned company almost halves printing costs by migrating to uniFLOW...Government-owned company almost halves printing costs by migrating to uniFLOW...
Government-owned company almost halves printing costs by migrating to uniFLOW...Canon Business CEE
 
Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...
Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...
Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...Canon Business CEE
 
Oil industry managed print sevices - (NIS case study) - Canon CEE
Oil industry managed print sevices - (NIS case study) - Canon CEEOil industry managed print sevices - (NIS case study) - Canon CEE
Oil industry managed print sevices - (NIS case study) - Canon CEECanon Business CEE
 
Experience uniFLOW IT Admin - Canon CEE
Experience uniFLOW IT Admin - Canon CEEExperience uniFLOW IT Admin - Canon CEE
Experience uniFLOW IT Admin - Canon CEECanon Business CEE
 
Experience uniFLOW executive - Canon CEE
Experience uniFLOW executive - Canon CEEExperience uniFLOW executive - Canon CEE
Experience uniFLOW executive - Canon CEECanon Business CEE
 
Experience uniFLOW enduser - Canon CEE
Experience uniFLOW enduser - Canon CEEExperience uniFLOW enduser - Canon CEE
Experience uniFLOW enduser - Canon CEECanon Business CEE
 
A scalable print management solution boosts labor productivity and improves d...
A scalable print management solution boosts labor productivity and improves d...A scalable print management solution boosts labor productivity and improves d...
A scalable print management solution boosts labor productivity and improves d...Canon Business CEE
 
Streamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEEStreamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEECanon Business CEE
 
Optimise your payment processes - Canon CEE
Optimise your payment processes - Canon CEEOptimise your payment processes - Canon CEE
Optimise your payment processes - Canon CEECanon Business CEE
 
Risk and compliance as a business strengh - Canon CEE
Risk and compliance as a business strengh - Canon CEERisk and compliance as a business strengh - Canon CEE
Risk and compliance as a business strengh - Canon CEECanon Business CEE
 
Understand mobile working - Canon CEE
Understand mobile working - Canon CEEUnderstand mobile working - Canon CEE
Understand mobile working - Canon CEECanon Business CEE
 
The impact of accelerated Cash Flow visibility - Canon CEE
The impact of accelerated Cash Flow visibility - Canon CEEThe impact of accelerated Cash Flow visibility - Canon CEE
The impact of accelerated Cash Flow visibility - Canon CEECanon Business CEE
 

More from Canon Business CEE (19)

Evolution of the Digital Workplace - Office Insights 2018
Evolution of the Digital Workplace - Office Insights 2018Evolution of the Digital Workplace - Office Insights 2018
Evolution of the Digital Workplace - Office Insights 2018
 
Océ VarioPrint 6000 TITAN
Océ VarioPrint 6000 TITANOcé VarioPrint 6000 TITAN
Océ VarioPrint 6000 TITAN
 
Canon обновляет широкоформатные МФУ начального уровня
Canon обновляет широкоформатные МФУ начального уровняCanon обновляет широкоформатные МФУ начального уровня
Canon обновляет широкоформатные МФУ начального уровня
 
Sell out presentation of Canon varioPRINT 140 series
Sell out presentation of Canon varioPRINT 140 seriesSell out presentation of Canon varioPRINT 140 series
Sell out presentation of Canon varioPRINT 140 series
 
Canon varioPRINT 140 series
Canon varioPRINT 140 seriesCanon varioPRINT 140 series
Canon varioPRINT 140 series
 
Canon imageRUNNER C3025i Press Release_Canon CEE
Canon imageRUNNER C3025i Press Release_Canon CEECanon imageRUNNER C3025i Press Release_Canon CEE
Canon imageRUNNER C3025i Press Release_Canon CEE
 
Canon image formula DR-M260 – безграничные возможности сканирования и обработ...
Canon image formula DR-M260 – безграничные возможности сканирования и обработ...Canon image formula DR-M260 – безграничные возможности сканирования и обработ...
Canon image formula DR-M260 – безграничные возможности сканирования и обработ...
 
Government-owned company almost halves printing costs by migrating to uniFLOW...
Government-owned company almost halves printing costs by migrating to uniFLOW...Government-owned company almost halves printing costs by migrating to uniFLOW...
Government-owned company almost halves printing costs by migrating to uniFLOW...
 
Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...
Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...
Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...
 
Oil industry managed print sevices - (NIS case study) - Canon CEE
Oil industry managed print sevices - (NIS case study) - Canon CEEOil industry managed print sevices - (NIS case study) - Canon CEE
Oil industry managed print sevices - (NIS case study) - Canon CEE
 
Experience uniFLOW IT Admin - Canon CEE
Experience uniFLOW IT Admin - Canon CEEExperience uniFLOW IT Admin - Canon CEE
Experience uniFLOW IT Admin - Canon CEE
 
Experience uniFLOW executive - Canon CEE
Experience uniFLOW executive - Canon CEEExperience uniFLOW executive - Canon CEE
Experience uniFLOW executive - Canon CEE
 
Experience uniFLOW enduser - Canon CEE
Experience uniFLOW enduser - Canon CEEExperience uniFLOW enduser - Canon CEE
Experience uniFLOW enduser - Canon CEE
 
A scalable print management solution boosts labor productivity and improves d...
A scalable print management solution boosts labor productivity and improves d...A scalable print management solution boosts labor productivity and improves d...
A scalable print management solution boosts labor productivity and improves d...
 
Streamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEEStreamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEE
 
Optimise your payment processes - Canon CEE
Optimise your payment processes - Canon CEEOptimise your payment processes - Canon CEE
Optimise your payment processes - Canon CEE
 
Risk and compliance as a business strengh - Canon CEE
Risk and compliance as a business strengh - Canon CEERisk and compliance as a business strengh - Canon CEE
Risk and compliance as a business strengh - Canon CEE
 
Understand mobile working - Canon CEE
Understand mobile working - Canon CEEUnderstand mobile working - Canon CEE
Understand mobile working - Canon CEE
 
The impact of accelerated Cash Flow visibility - Canon CEE
The impact of accelerated Cash Flow visibility - Canon CEEThe impact of accelerated Cash Flow visibility - Canon CEE
The impact of accelerated Cash Flow visibility - Canon CEE
 

Recently uploaded

In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfalexjohnson7307
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 

Recently uploaded (20)

In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 

8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #6 Secure data through the life of devices

  • 1. SECURE DATA THROUGH THE LIFE OF DEVICES 8 WAYS TO PROTECT THE DATA IN YOUR OFFICE #6
  • 2. At any point in time, multifunctional devices used for printing, scanning, copying and faxing may contain, within them, large amounts of data that should be protected – from print jobs waiting to be printed, to received faxes, scanned data, address books, activity logs and job history. CANON SOLUTIONS HDD SECURE DATA ERASE DATA REMOVAL SERVICE REMOVABLE HARDDRIVEKIT INTELLECTUAL PROPERTY CONTROL POLICY The Risks Unless appropriate procedures are put in place, there is a risk that any device removed from premises, for whatever reason, may contain precious information. Organisations that use office equipment want to know that any confidential information held on devices during their operation is removed or destroyed in order to avoid heavy fines or damage to brand reputation from data leaks. #6 SECURE DATA THROUGH THE LIFE OF DEVICES YOUROPTIONS Formalise data destruction policies during the life of a device Remove hard disk drives during use with Canon’s removable hard disk drive kit* Erase sensitive data in real time with Canon’s hard disk secure data erase tool Ensure data stored in devices is removed at end of life with Canon’s data removal service Canon devices protect data at each stage of the device life-cycle to safeguard confidentiality and integrity, ensuring the availability of data is maintained. DEVICE LIFE CYCLE BEFORE USE Configure devices against a security hardening profile aligned to your risk appetite How? Canon hardening guide and PDI configuration services IN USE Ensure any data created, published and stored during operation is kept safe How? IP control policy, Removable hard drive, HDD secure data erase, Data encryption AFTER USE Prevent data resident on devices and their hard drives from falling into the wrong hands How? Data removal service for end-of-life devices *HDD available with specific devices only Secure Data Through the Life of Devices 32 Secure Data Through the Life of Devices
  • 3. Keep device hard disks in a safe place when not in use. REMOVABLE HARD DRIVE KIT INTELLECTUAL PROPERTY CONTROL POLICY As part of our Intellectual Property Control Policy, no hard disk drive will be removed without confirmation from an authorised responsible user. As it always remains the responsibility of the information owner to correctly destroy data at the end of its life, the user may wish to retain the hard disk drive. These arrangements can be discussed and formalised in property control policies that Canon can implement as part of a Managed Print Service. The optional kit allows the removal of a hard disk for storage in a secure location. The hard disk can be removed and reinstalled easily and securely. Once installed, it is secured by padlock. When the HDD Mirroring Kit or HDD Data Encryption & Mirroring Kit is used with the Removable HDD Kit, you can store the same data on two hard disks and you can encrypt the data and store the hard disks in a safe place. It is important for organisations to consider data destruction at (1) the end of the device life, (2) an in-service failure or (3) as part of a device movement. WHY USE IT? This feature provides another layer of data security for government agencies, corporate offices, law firms, financial institutions, and other organisations that need to ensure that data stored on the hard disk is physically secured when the unit is not in use. IN USE IN USE Secure Data Through the Life of Devices 54 Secure Data Through the Life of Devices
  • 4. HDD SECURE DATA ERASE IT’S REAL TIME Real time erasure of sensitive data stored on hard disk drive of the device produced during copying, printing, scanning and faxing is possible and can prevent the reprinting of materials. PREVENTS A DATA TRAIL Secure data erase provides an additional level of assurance by removing or protecting data at rest on the MFD. Without this functionality enabled only the pointer to the data is deleted and not the actual data itself. THE FOLLOWING DATA IS COMPLETELY ERASED: • Image data created when scanning • Temporary data created when using the Remote or Cascade Copying mode • Data that remained after you deleted a document in an inbox • Sent and received fax/I-fax data • Spooled data • Data temporarily stored as print data If the HDD Secure Data Erase option is enabled, data is automatically and completely erased when it is deleted from the hard disk and ensures that no data remains. You can select the Erase mode and timing for erasing data from the hard disk. Canon offers a comprehensive service to help protect sensitive information by removing all user data from redundant, end-of-life print devices. A number of options are available based on customer requirements and regional regulations. DATA REMOVAL SERVICE For each Canon MFD that is used for the output of sensitive material, we recommend the use of the Canon Hard Disk Drive (HDD) Secure Data Erase option. Ensure sensitive data is removed permanently from end-of-life devices AFTER USE Hard Disk Erase to DoD standard Device Inspection and certification Hard Disk Removal and hand over to customer Device Inspection and certification Hard Disk Removal and safe disposal in line with WEEE directive Device Inspection and certification 1 2 3 IN USE 6 Secure Data Through the Life of Devices Secure Data Through the Life of Devices 7
  • 5. Canon Europe Ltd 3 The Square, Stockley Park, Uxbridge, Middlesex UB11 1ET UK Canon U.K. Ltd Woodhatch Reigate Surrey RH2 8BF UK Canon Inc. Canon.com Canon Europe canon-europe.com English Edition © Canon Europa N.V., 2017 INTERESTED? There is no fool-proof plug and play office security solution. Every business has to determine what represents an acceptable level of risk. Canon is a pro-active partner to businesses seeking to keep data safe as part of a resilient enterprise information security policy. One voice Our information security team is responsible for both Canon’s internal information security, and the advice and solutions we offer to our customer. Our is an ethos of security and privacy by design When we design or select technologies, products and services for our customers, we consider their likely information security impact on our customers’ environment, and incorporate security and measures to enable protection to the desired level. An inclusive approach All organisations are different. There is no one-size- fits-all solution when it comes to formulating a appropriate information security approach for your business. At Canon, our approach is to work closely with our customers to build better information security together. Satisfy the information security expectations of: • Shareholders • Staff • Customers • Suppliers • Partners • Guests • Channel Partners • Contractors