User GuideP 501/502

Using Auto Erase Memory

Important

  • When the optional hard disk is installed and Auto Erase Memory is set to [On], temporary data that remained on the hard disk while Auto Erase Memory was set to [Off] might not be overwritten.

  • When the optional hard disk is installed, overwriting will stop and data will be left on the hard disk if the main power switch is turned off before Auto Erase Memory is completed.

  • Do not stop the overwrite mid-process. Doing so will damage the hard disk.

  • If the main power switch is turned off before Auto Erase Memory is completed, overwriting will continue once the main power switch is turned back on.

  • If an error occurs before overwriting is completed, turn off the main power. Turn it on, and then repeat from Step 1.

  • The machine will not enter Sleep mode until overwriting has been completed.

1Press the [Menu] key.

2Log in as the machine administrator.

For details on how to log in, see Administrator Login Method.

3Press the [Up arrow key] or [Down arrow key] key to select [Security Options], and then press the [OK] key.

Operation panel screen illustration

4Press the [Up arrow key] or [Down arrow key] key to select [Auto Erase Memory Setting], and then press the [OK] key.

5Press the [Up arrow key] or [Down arrow key] key to select [On].

6Press the selection key beneath [HDDErase], and then select the method of overwriting as follows:

  • NSA

    Press the [Up arrow key] or [Down arrow key] key to select [NSA], and then press the [OK] key.

  • DoD

    Press the [Up arrow key] or [Down arrow key] key to select [DoD], and then press the [OK] key.

  • Random Numbers

    Press the [Up arrow key] or [Down arrow key] key to select [Random Numbers], and then press the [OK] key.

    Press the [Up arrow key] or [Down arrow key] key to specify the number of times that you want to overwrite, and then press the [OK] key.

7Press the [OK] key.

8Log out.

For details about logging out, see Administrator Logout Method.

Note

  • If you enable both overwriting and data encryption, the overwriting data will also be encrypted.