WHITE PAPER SAMSUNG MFP SECURITYPage - 10 Copyright 2014 Samsung Electronics Co., Ltd., All rights reserved.3. Security Business RequirementsBusinesses today are constantly creating new ways to use information. IT professionals have the demanding task ofprotecting that information from new ways of abuse. The most successful strategy for protecting this information is byimplementing best practices for user authorization and to use devices that provide a high level of security.Samsung MFP devices employ high levels of security to meet or exceed today’s business security requirements. We arealso working with our business customers to continuously improve our MFP security features.3.1 Public Sector (Government / Education / Healthcare)Security RequirementsPublic sector entities have very specialized security needs. The military must be able to protect sensitive information fromforeign interests. Schools need to be able to protect the integrity of their student’s grades. Healthcare systems mustprotect the privacy of their patients.3.1.1 GovernmentU.S. government requirements include hard drive overwriting schemes that digitally shred the latent documentinformation from the hard drive of a device. When devices with hard drives are removed from secure sites, the hard drivesmust be removed and physically destroyed.Regulatory requirements that require these practices include the following:• FISMAThis regulation requires a mandatory set of processes that must be followed for all information systems used oroperated by a U.S. federal government agency.• HSPD-12A common identification standard used to ensure that government facilities and sensitive information stored innetworks remain protected.EnterpriseSMBData SecurityComplianceProtectionfrom Damageto IT Infra.SecureCommunicationEmergingTechnologies 6%11%16%19%37%6%9%13%24%36% Many regulations and ITbest practices prescribeappropriate securityrequirements to whichorganizations, especiallywithin regulated verticals,must comply. Data security, data leakprevention, identitymanagement, securityinformation logging, andevent management arethe most importantsecurity categories.Regulatory Compliance• Gartner, Security Purchasing Behaviors, Worldwide, 2008• Gartner, Global SMB Security Purchasing Behaviors, 2008