19-1087-4141-CSA Version iR ADV Document Security ... · it relates to regulatory and statutory...
Transcript of 19-1087-4141-CSA Version iR ADV Document Security ... · it relates to regulatory and statutory...
RECOGNIZING DATA SECURITY BREACHES
HELP SECURE YOUR INFORMATION
CANON OFFERS SOLUTIONS
INFORM USERS
Ask your Canon Solutions America account representative about the various solutions available to help ensure your documents and information are protected. For more information, visit csa.canon.com.
DOCUMENT AND DATA SECURITY
• Employees should be provided with an ID/swipe card.
• Develop a set of permissions and access privileges that define the allowable actions of employees when printing or scanning information.
• Visiting users may access devices, but they’d have document access managed.
• Sensitive documents and information should be flagged and blocked/restricted based on an employee’s access level.
• Use secure watermarks on corporate information.
• Data and images should be encrypted when they’re stored.
• Record fax number and emaildestination of recipients, and consider blocking some known numbers and email extensions you want to avoid.
• Consider shredding or securely disposing any documents left in recycle bins.
• Devices should be programmed to release jobs when employee is authenticated.
• Hard drives should be encrypted and routinely erased of all document content information.
• Keep a record of all print/copy/scan/fax activity by user.
• Consider removing personal desktop printers that aren’t tracking document and user access.
Canon is a registered trademark of Canon Inc. in the United States and elsewhere. All other referenced product names and marks are trademarks of their respective owners. All images and effects are simulated. Not responsible for typographical errors.
Canon Solutions America does not provide legal counsel or regulatory compliance consultancy, including without limitation, regarding Sarbanes-Oxley, HIPAA, GDPR, GLBA, Check 21 or the USA Patriot Act. Each customer must have its own qualified counsel determine the advisability of a particular solution as it relates to regulatory and statutory compliance. Canon products offer certain security features, yet many variables can impact the security of your devices and data. Canon does not warrant that use of its features will prevent security issues. Some security features may impact functionality/performance; you may want to test these settings in your environment.
© 2020 Canon Solutions America, Inc. All rights reserved.
CSA/7-17-223
0717-CSADDSIG-IH
2 31
of data breacheswere caused by
malicious activity.*
system glitch*
by managing these three aspects of your organization:
Most companies have invested significant capital to ensure their network and information are protected from hackers. But did you know ...
that can help your organization improve document security
Ensure that employees understand that you have a document security plan and that information security is a priority.
DOCUMENTS DEVICES + NETWORKPEOPLE
51%
25%
*2019 Cost of a Data Breach Study by the Ponemon Institute and IBM Security.
DOCUMENT ACCESS REPORT
IT MANAGER
csa.canon.com
VISITOR ACCESS
VISITOR
SECURE WATERMARK TRACK USERS SECURE PRINT HDD ERASE
CONFIDENTIAL
CON
FIDEN
TIAL
Secure watermark on selected documents.
Track all users’ activity and restrict access and distribution of
confidential documents.
Restrict access to devices to
authenticated users/ release jobs only
while user is present.
Erase device hardware when
replacing it.
human error* 24%
19-1087-4141