FYI - Here is Xerox's response:
~~~~~~~~~~~~~~~~~~~~~~~
April 20, 2010 

 

Re:  Digital Photocopiers Loaded With Secrets - CBS News Story

 

Periodically stories focusing on digital copier or multifunctional
product security surface in the media.

 

Xerox has been at the forefront of the digital copier product security
movement that began in January 2000, when the Federal Government
released an instruction called NTISSP 11.  This instruction required
agencies of the Federal Government insure the secure functioning of
network-connected devices, even those that fell into the COTS
(commercial, off-the-shelf) classification.

 

An element of secure functionality is to actively remove any residual
data.  Residual data is what remains behind in electronic memory or on
disk drives after any function (copy, print, scan, fax) has been
completed.  Xerox addressed that requirement first in 2001 with an
optional feature called 'Disk Image Overwrite' that would 'scrub' the
disk drives in accordance with US Department of Defense specifications,
the most stringent requirement at that time.  That capability moved
through most of our product portfolio after 2001, and now is available
in nearly every disk equipped product Xerox offers.

 

At the end of 2006 Xerox made the decision to include the Disk Image
Overwrite option as a standard feature on most of the products in the
Office portfolio, and to allow installation of the option at no charge
on the products in customer sites that previously offered the option for
a fee.

 

At the same time, Xerox also instituted a program allowing customers to
purchase disk drives, at an attractive price, from any Xerox product at
the end of lease or product removal.  The purpose of this program is
two-fold:  to allow very high-security locations positive control of the
disk drive, and to provide a secure solution for earlier products that
did not offer a Disk Image Overwrite capability.

 

Selected Xerox products are submitted for an exhaustive security testing
and certification process, known as "The Common Criteria for Information
Technology Security Evaluation", or, in shorthand, "The Common
Criteria".  The Common Criteria Mutual Recognition Arrangement is
comprised of 26 member nations that test and certify information
technology products to common security guidelines.

 

Xerox has enjoyed a competitive advantage for several years as the only
MFP vendor to certify the entire product, including all components and
functions.  Other vendors have certified only small parts of their
products, leaving untested potential vulnerabilities.  See
www.commoncriteriaportal.org <http://www.commoncriteriaportal.org/>  for
more information.

 

We have an active and informational security component of our
public-facing web presence.  Guidance is offered on this site for secure
operation of Xerox products.  See www.xerox.com/security

 

There is also a very active security-focused community of practice
inside Xerox addressing not just our product security, but security of
our transactional business and that of the Xerox infrastructure.  

 

In summary, Xerox is very well equipped to address any concerns that
might be generated by stories of this type, and has enjoyed a leadership
role in product security for the last 8 years or so.  We are striving to
keep that leadership position

 

~~~~~~~~~~~~~~~~~~~~~~~~

________________________________

From: David Mazzaccaro [mailto:[email protected]] 
Sent: Friday, April 23, 2010 10:50 AM
To: NT System Admin Issues
Subject: RE: Copier Hard Drives and sensitive data?


This article is full of FUD.  Read the comments...
Here's the link.. it was CBS...
http://www.cbsnews.com/stories/2010/04/19/eveningnews/main6412439.shtml
<http://www.cbsnews.com/stories/2010/04/19/eveningnews/main6412439.shtml
>  
 

________________________________

From: David McSpadden [mailto:[email protected]] 
Sent: Friday, April 23, 2010 10:47 AM
To: NT System Admin Issues
Subject: Copier Hard Drives and sensitive data?



Operations Officer comes to me this morning and asks if we wipe our
copiers clean before we give them away or throw them away.

I say we clean everything before we ever let it go out of our department
but why are you asking about copiers.  He proceeds to tell me about a
20/20 or 60 minutes spot where some person but 5 copiers and got all
kinds of personal info from police departments and what not's because
copiers have hard drives in them and they retain everything that is
copied to them over time.  

 

So, is this true?

 

If so is there a way to 'clean' them before reselling them or trashing
them and still keeping them functional? 

 

 

 

 


.


 

 


.
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to