Océ Explains How to Safeguard Sensitive Data on Large-Format Printing Devices

TRUMBULL, CT—August 22, 2012—Data-sensitive environments are no longer limited to defense agencies, power generation firms, and related contractors. Today, any enterprise that places a high-value on its intellectual property should take precautions to ensure the security and integrity of its digital information.

Océ, a Canon Group company and an international leader in digital document management, provides insights into the importance of safeguarding sensitive data that may be stored on the disk drives of large-format printing devices and how users can securely overwrite sensitive data with the help of electronic shredding technology options.

Protecting Your Sensitive Data

The disk drive that is part of a large-format printing device’s controller is used as a temporary repository for spooling and processing data (e.g. copy, scan and print jobs). These drives are susceptible to data remanence—residual representation of data that remains even after the data is deleted—which can inadvertently make sensitive data available to unauthorized users.

The Importance of Electronic Shredding

Proper disposal of sensitive or confidential electronic data stored on a large-format printer’s disk drive is imperative to preventing inadvertent disclosure of sensitive or confidential information. To prevent this from happening, specific security precautions should be integrated into all network devices, including large-format printing systems.

Purchasing a large-format device that is equipped with electronic data shredding (or e-shredding) functionality can help prevent recovery of previously printed, scanned and copied documents. With e-shredding technology, data is overwritten in such a way that makes it impossible to retrieve or reconstruct it.

Print, copy and scan jobs sent to a large format-print system enabled with this technology are completely overwritten and erased upon completion of the job. E-shredding technology can be particularly useful in decentralized walk-up environments where many different users have unregulated access to the system.

Electronic Shredding Options

Most systems that offer e-shredding functionality allow the administrator to select from a number of overwrite algorithms. Common algorithms used in the United States include:

Gutmann: All jobs on the system are erased in 35 overwrite passes. An overwrite session consists of a lead-in of four random write patterns, followed by 27 specific patterns executed in a random order, and a lead-out of four more random patterns.

• U.S. Department of Defense 5220.22-M: This is generally regarded as the highest level standard for sanitization to counter data remanence. It meets U.S. Department of Defense requirements for erasure of disk media.

Custom: The system administrator defines the number of overwrite passes manually.

Related Content