Surveillance
Surveillance has been conducted on this TOE in accordance with JISEC Scheme Documents.
- Product Name :
- Japanese: e-STUDIO
5520C/6520C/6530C
System Software
English: System Software
for e-STUDIO
5520C/6520C/6530C
- Version of TOE :
- V3.0
- Product Type :
- data protection function in Multi Function Device
- Certification No. :
- C0194
- Date :
- 2008-11-28
(Surveillance completed
on 2012-08-17)
- Version of Common Criteria:
- 3.1
- Conformance Claim :
- EAL3
- PP Identifier :
- None
- Vendor :
- TOSHIBA TEC CORPORATION
-
- POC :
- Toshiyasu Takahashi
- Division :
- Products Planning & Marketing Div.
- Phone :
- +81-3-6422-7754
- E-mail :

- Evaluation Facility :
- Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
- CC
Certificate Image :

(452KB)(2009-01-05)
PRODUCT DESCRIPTION
Description of TOE
The TOE is the system software of the digital multi function device “e-STUDIO
5520C/6520C/6530C” manufactured by TOSHIBA TEC CORPORATION.
The TOE controls general functions as a digital multi function device (Copy, Scan, Print and Fax), and provides functions of e-Filing Box and Shared folder.
TOE Security functions
The TOE provides function of data overwrite and complete deletion on the user document data deleted from HDD in the “e-STUDIO5520C/6520C/6530C” (except following data: fax reception; expired user document data stored in e-Filing Box and Shared folder after such data’s effective period).
The function of data overwrite and complete deletion includes the function to collectively and completely delete all user document data from the HDD before the HDD is disposed or replaced.
This function also prevents unauthorized restore of data.
Security functional requirements
This TOE implements the following security functional requirements.
| Security audit | Non-repudiation of origin/receipt | Cryptographic functionality | Access control |
| Data authentication | Export data protection | Information flow control | Import data protection |
| Internal transfer data protection | Residual information protection | Rollback | Stored data integrity |
| Transfer data confidentiality | Transfer data integrity | Identification and authentication | Security management |
| Privacy Control | Security functionality protection | Resource utilisation management | TOE access control |
| Trusted path/channels |


