Datenschutz und Datensicherheit - DuD

, Volume 32, Issue 9, pp 593–596 | Cite as

Secure printing

How to mitigate risks while dealing with secure printing matters
  • Isabella Santa
Schwerpunkt Awareness
  • 80 Downloads

Abstract

Business and transaction documents printed by users or in captive printing and mailing operations are susceptible to security breaches. Awareness of the related risks is crucial for corporations.

Keywords

Information Security Intellectual Property Right Security Breach Information Security Management Printing Environment 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    A typical MFP may act as a combination of some or all of the following devices: printer, scanner, photocopier, fax or e-mail.Google Scholar
  2. [2]
    BERR 2008 Information Security Breaches Survey, PricewaterhouseCoopers, United Kingdom, April 2008, available at www.security-survey.gov.uk (last visited on 22 April 2008).Google Scholar
  3. [3]
    Is managed print service right for your office?, Ken Weilerstein, 16 December 2005.Google Scholar
  4. [4]
    User survey: managed print services, Europe, 2005 (executive summary), Cecile Drew, Malcolm Hancock, Gartner, 2 September 2005.Google Scholar
  5. [5]
    What IT asset managers need to know about managing office print before it falls into their lap, Ken Weilerstein, Gartner, 11 November 2005; Secure printing solutions best practice — key concept, value add security advice for your organisation, Hewlett-Packard, 2005.Google Scholar
  6. [6]
    Quarterly statistics: state of the printer, copier and MFP market, EMEA, 2Q07, Sharon McNee, Cecile Drew, Tosh Prabhakar, Gartner, 10 September 2007.Google Scholar
  7. [7]
  8. [8]
    https://www.pcisecuritystandards.org/tech/index.htm (last visited on 14 April 2008).Google Scholar
  9. [9]
    The PCI standard and its implications for the security industry, Mathieu Gorge, VigiTrust, Computer Fraud & Security, February 2006.Google Scholar
  10. [10]
    COBIT 4.1 Excerpt — Executive summary framework, http://www.isaca.org/AMTemplate.cfm?Section=Downloads&Template=/ContentManagement/ContentDisplay. cfm&ContentID=34172 (last visited on 4 April 2008).
  11. [11]
    COBIT 4.1, IT Governance Institute, USA, 2007.Google Scholar
  12. [12]
    Secure printing solutions best practice — key concept, value add security advice for your organisation, Hewlett-Packard, 2005.Google Scholar
  13. [13]
    Small office/home office LANs face network access security challenges, John Girard, Gartner, 6 July 2005.Google Scholar
  14. [14]
    COBIT 4.1, IT Governance Institute, USA, 2007.Google Scholar
  15. [15]
    Managing an Information Security and Privacy Awareness and Training Program, Rebecca Herold, USA, 2005.Google Scholar
  16. [16]
    A Users’ Guide: How to raise Information Security Awareness, ENISA, June 2006, available at http://www.enisa.europa.eu/doc/pdf/deliverables/enisa_a_users_guide_how_to_raise_IS_awareness.pdf
  17. [17]
    Eliminate banner pages and save up to 20 % in printing consumables, Federico De Silva Leon, Charles Smulders, Ken Weilerstein, Gartner, 10 October 2007.Google Scholar
  18. [18]
    Q&A for overcoming obstacles in managing office printing, Ken Weilerstein, Gartner, 28 March 2008.Google Scholar

Copyright information

© Vieweg+Teubner | GWV Fachverlage GmbH 2008

Authors and Affiliations

  • Isabella Santa

There are no affiliations available

Personalised recommendations