If the security settings are not configured, the data in the machine is vulnerable to attack.
To prevent this machine from being stolen or willfully damaged, install it in a secure location.
Purchasers of this machine must make sure that people who use it do so appropriately, in accordance with operations determined by the machine administrator and supervisor. If the administrator or supervisor does not make the required security settings, there is a risk of security breaches by users.
Before setting this machine's security features and to ensure appropriate operation by users, administrators must read the Security Guide completely and thoroughly, paying particular attention to the section entitled "Before Configuring the Security Function Settings".
Administrators must inform users regarding proper usage of the security functions.
If this machine is connected to a network, its environment must be protected by a firewall or similar.
For protection of data during the communication stage, apply the machine's communication security functions and connect it to devices that support security functions such as encrypted communication.
Administrators should regularly examine the machine's logs to check for irregular and unusual events.