- ページ 7

オール・イン・ワン・プリンター Toshiba e-studio 2555cseのPDF 安全情報マニュアルをオンラインで閲覧またはダウンロードできます。Toshiba e-studio 2555cse 32 ページ。 Multifunctional digital color systems

Toshiba e-studio 2555cse 安全情報マニュアル

Security Precautions

In order to make correct use of this product's security function, first read the following precautions carefully.
Be sure to assign administrators who have enough capability to sustain responsible management since
significant privileges for managing and handling this equipment will be given them.
 To Administrators
 To avoid physical security problems, such as hardware removal or inappropriate disassembly at the
installation site, take all necessary measures, such as checking who enters and leaves the site.
 When connecting this product with an outer network such as the Internet, only operate it in a network
environment protected by a firewall, etc. to prevent information from being leaked due to incorrect
settings or avoid illegal access by unauthorized users.
 To prevent the configuration settings from being altered improperly or similar, before you use this
product, change the administrator and user registration passwords set by factory default. Also, be sure
periodically to change each password set for this product.
 In order to make proper use of the network and user management functions, be sure to read the
TopAccess Guide first.
 Be sure to understand the security policy and its procedure in your organization, and manage and
operate this equipment and external devices according to the policy after first reading the operator's
manual. Then explain the security instructions to general users who are authorized to use this
equipment to let them conform to the security rule.
 Provide general users with the appropriate privilege of using this equipment and keep supervising its
correct operation.
 Always check if the network function and user management function are enabled in order to maintain
security. Should you happen to come across any abnormality, contact your service technician
immediately. See the TopAccess Guide for the checking method.
 If any failure or unauthorized access occurs in this equipment, check the logs in TopAccess to find the
cause. For details of checking logs, refer to the TopAccess Guide.
 To general users
 After you have finished operating the equipment, be careful not to forget to remove any originals, printed
paper or USB storage devices.
 Change the password regularly. Make sure not to use any predictable number such as your birthday or
employee ID number, and keep it secret.
 Do not leave the equipment during the performance of the job since your originals may be seen or the
output paper could be taken by someone.
 Check your log regularly to guard against unauthorized access by identity theft. If there are too many
logs, you may find the one you want more easily using the sort function in TopAccess.
Security Precautions
5