Open Enrollment | Subscribe to Printing Impressions HERE
Connect
Follow us on
Advertisement
 

Océ Explains How to Safeguard Sensitive Data on Large-Format Printing Devices

August 22, 2012
TRUMBULL, CT—August 22, 2012—Data-sensitive environments are no longer limited to defense agencies, power generation firms, and related contractors. Today, any enterprise that places a high-value on its intellectual property should take precautions to ensure the security and integrity of its digital information.
 
Océ, a Canon Group company and an international leader in digital document management, provides insights into the importance of safeguarding sensitive data that may be stored on the disk drives of large-format printing devices and how users can securely overwrite sensitive data with the help of electronic shredding technology options.
 
Protecting Your Sensitive Data

The disk drive that is part of a large-format printing device’s controller is used as a temporary repository for spooling and processing data (e.g. copy, scan and print jobs). These drives are susceptible to data remanence—residual representation of data that remains even after the data is deleted—which can inadvertently make sensitive data available to unauthorized users.

The Importance of Electronic Shredding

Proper disposal of sensitive or confidential electronic data stored on a large-format printer’s disk drive is imperative to preventing inadvertent disclosure of sensitive or confidential information. To prevent this from happening, specific security precautions should be integrated into all network devices, including large-format printing systems.

Purchasing a large-format device that is equipped with electronic data shredding (or e-shredding) functionality can help prevent recovery of previously printed, scanned and copied documents. With e-shredding technology, data is overwritten in such a way that makes it impossible to retrieve or reconstruct it.

Print, copy and scan jobs sent to a large format-print system enabled with this technology are completely overwritten and erased upon completion of the job. E-shredding technology can be particularly useful in decentralized walk-up environments where many different users have unregulated access to the system.

Electronic Shredding Options

Most systems that offer e-shredding functionality allow the administrator to select from a number of overwrite algorithms. Common algorithms used in the United States include:
 
Gutmann: All jobs on the system are erased in 35 overwrite passes. An overwrite session consists of a lead-in of four random write patterns, followed by 27 specific patterns executed in a random order, and a lead-out of four more random patterns.
 
• U.S. Department of Defense 5220.22-M: This is generally regarded as the highest level standard for sanitization to counter data remanence. It meets U.S. Department of Defense requirements for erasure of disk media.
 
Custom: The system administrator defines the number of overwrite passes manually.

If data security is important to your enterprise, implementation of e-shredding functionality in a wide format workflow is a user-transparent measure to guard against data remanence. For more information about secure data image overwrite technology on large-format devices, download the whitepaper “Safeguard Your Sensitive Data.”

About Océ
Océ is one of the leading providers of document management and printing for professionals. The Océ offering includes office printing and copying systems, high speed digital production printers and wide format printing systems for both technical documentation and color display graphics. Océ is also a foremost supplier of document management outsourcing.

Source: Océ.

 

COMMENTS

Click here to leave a comment...
Comment *
Most Recent Comments: