19-1087-4141-CSA Version iR ADV Document Security ... · it relates to regulatory and statutory...

1
RECOGNIZING DATA SECURITY BREACHES HELP SECURE YOUR INFORMATION CANON OFFERS SOLUTIONS INFORM USERS Ask your Canon Solutions America account representative about the various solutions available to help ensure your documents and information are protected. For more information, visit csa.canon.com. DOCUMENT AND DATA SECURITY • Employees should be provided with an ID/swipe card. • Develop a set of permissions and access privileges that define the allowable actions of employees when printing or scanning information. • Visiting users may access devices, but they’d have document access managed. • Sensitive documents and information should be flagged and blocked/restricted based on an employee’s access level. • Use secure watermarks on corporate information. • Data and images should be encrypted when they’re stored. • Record fax number and email destination of recipients, and consider blocking some known numbers and email extensions you want to avoid. • Consider shredding or securely disposing any documents left in recycle bins. • Devices should be programmed to release jobs when employee is authenticated. • Hard drives should be encrypted and routinely erased of all document content information. • Keep a record of all print/copy/scan/fax activity by user. • Consider removing personal desktop printers that aren’t tracking document and user access. Canon is a registered trademark of Canon Inc. in the United States and elsewhere. All other referenced product names and marks are trademarks of their respective owners. All images and effects are simulated. Not responsible for typographical errors. Canon Solutions America does not provide legal counsel or regulatory compliance consultancy, including without limitation, regarding Sarbanes-Oxley, HIPAA, GDPR, GLBA, Check 21 or the USA Patriot Act. Each customer must have its own qualified counsel determine the advisability of a particular solution as it relates to regulatory and statutory compliance. Canon products offer certain security features, yet many variables can impact the security of your devices and data. Canon does not warrant that use of its features will prevent security issues. Some security features may impact functionality/performance; you may want to test these settings in your environment. © 2020 Canon Solutions America, Inc. All rights reserved. CSA/7-17-223 0717-CSADDSIG-IH 2 3 1 of data breaches were caused by malicious activity. * system glitch * by managing these three aspects of your organization: Most companies have invested significant capital to ensure their network and information are protected from hackers. But did you know ... that can help your organization improve document security Ensure that employees understand that you have a document security plan and that information security is a priority. DOCUMENTS DEVICES + NETWORK PEOPLE 51% 25% *2019 Cost of a Data Breach Study by the Ponemon Institute and IBM Security. DOCUMENT ACCESS REPORT IT MANAGER csa.canon.com VISITOR ACCESS VISITOR SECURE WATERMARK TRACK USERS SECURE PRINT HDD ERASE CONFIDENTIAL CONFIDENTIAL Secure watermark on selected documents. Track all users’ activity and restrict access and distribution of confidential documents. Restrict access to devices to authenticated users/ release jobs only while user is present. Erase device hardware when replacing it. human error * 24% 19-1087-4141

Transcript of 19-1087-4141-CSA Version iR ADV Document Security ... · it relates to regulatory and statutory...

Page 1: 19-1087-4141-CSA Version iR ADV Document Security ... · it relates to regulatory and statutory compliance. Canon products offer certain security features, yet many ... plan and that

RECOGNIZING DATA SECURITY BREACHES

HELP SECURE YOUR INFORMATION

CANON OFFERS SOLUTIONS

INFORM USERS

Ask your Canon Solutions America account representative about the various solutions available to help ensure your documents and information are protected. For more information, visit csa.canon.com.

DOCUMENT AND DATA SECURITY

• Employees should be provided with an ID/swipe card.

• Develop a set of permissions and access privileges that define the allowable actions of employees when printing or scanning information.

• Visiting users may access devices, but they’d have document access managed.

• Sensitive documents and information should be flagged and blocked/restricted based on an employee’s access level.

• Use secure watermarks on corporate information.

• Data and images should be encrypted when they’re stored.

• Record fax number and emaildestination of recipients, and consider blocking some known numbers and email extensions you want to avoid.

• Consider shredding or securely disposing any documents left in recycle bins.

• Devices should be programmed to release jobs when employee is authenticated.

• Hard drives should be encrypted and routinely erased of all document content information.

• Keep a record of all print/copy/scan/fax activity by user.

• Consider removing personal desktop printers that aren’t tracking document and user access.

Canon is a registered trademark of Canon Inc. in the United States and elsewhere. All other referenced product names and marks are trademarks of their respective owners. All images and effects are simulated. Not responsible for typographical errors.

Canon Solutions America does not provide legal counsel or regulatory compliance consultancy, including without limitation, regarding Sarbanes-Oxley, HIPAA, GDPR, GLBA, Check 21 or the USA Patriot Act. Each customer must have its own qualified counsel determine the advisability of a particular solution as it relates to regulatory and statutory compliance. Canon products offer certain security features, yet many variables can impact the security of your devices and data. Canon does not warrant that use of its features will prevent security issues. Some security features may impact functionality/performance; you may want to test these settings in your environment.

© 2020 Canon Solutions America, Inc. All rights reserved.

CSA/7-17-223

0717-CSADDSIG-IH

2 31

of data breacheswere caused by

malicious activity.*

system glitch*

by managing these three aspects of your organization:

Most companies have invested significant capital to ensure their network and information are protected from hackers. But did you know ...

that can help your organization improve document security

Ensure that employees understand that you have a document security plan and that information security is a priority.

DOCUMENTS DEVICES + NETWORKPEOPLE

51%

25%

*2019 Cost of a Data Breach Study by the Ponemon Institute and IBM Security.

DOCUMENT ACCESS REPORT

IT MANAGER

csa.canon.com

VISITOR ACCESS

VISITOR

SECURE WATERMARK TRACK USERS SECURE PRINT HDD ERASE

CONFIDENTIAL

CON

FIDEN

TIAL

Secure watermark on selected documents.

Track all users’ activity and restrict access and distribution of

confidential documents.

Restrict access to devices to

authenticated users/ release jobs only

while user is present.

Erase device hardware when

replacing it.

human error* 24%

19-1087-4141