by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : September 2015
6 Implement rules-based printing Rules-based printing controls output by analyzing print jobs according to a set of established rules before releasing them. Organizations with established print policies, such as U.S. Army Directive 2013-26 “Armywide Management of Printing and Copying Devices” or the General Services Administration’s PrintWise program, can enforce those policies by implementing rules- based printing. 7 Enforce trusted destinations Once necessary measures have been taken to restrict access to an MFP’s network functions through authentication and authorization controls, agencies must ensure that the devices are configured to prevent documents from being scanned or faxed to destinations that might risk the exposure of sensitive information. A common high-risk scenario is a networked MFP that is configured for scan-to-email and outbound analog faxing without controls in place to validate the email address or fax number of the recipient. 8 Monitor and control PII activity Most government organizations have policies to protect personally identifiable information and other sensitive content. For example, the Department of Homeland Security issued a handbook with mandatory guidelines for all employees to follow to protect PII within and outside the organization. Similarly, the Navy published a guide containing compliance requirements and protective measures to safeguard Navy and Marine Corps information. Agencies should use software to systematically enforce the PII policies they have enacted. Without a solution in place, organizations must rely on employees to follow the protocol, which leaves no room for user error. 9 Standardize and integrate network scanning One common problem with traditionally configured MFPs is that no two devices in an organization are set up the same way for document scanning. However, standardization would enable administrators to centrally control network folder scanning with a single configuration. Integration support is also important for all major commercial document systems to ensure direct and secure scanning. 10 Control access points To prevent damaging data breaches, government organizations must control and protect both the physical and electronic access points on their MFPs. The penalties, settlements and costs for failing to safeguard sensitive information are increasing, and there are simply too many touch points that create risk in sharing information. Most of them involve the technologies that organizations are counting on — especially networked MFPs that copy, print, scan, fax and email. Agencies must act to enable the compliant exchange of sensitive information by adding a layer of security and control to paper- based and electronic processes. They need an approach that transparently applies automated security techniques that cannot be circumvented and that authenticate users, control access to workflows, encrypt data, validate network destinations, monitor and control all documents containing PII, and build and maintain an audit trail of user activity. By adopting that approach, government organizations can minimize the manual work and decisions that introduce human error, mitigate the risk of non- compliance and avoid the damaging costs of sensitive data exposure. • — Chris Strammiello is vice president of global alliances and strategic marketing at Nuance Communications. 32 GCN SEPTEMBER 2015 • GCN.COM SECURE PRINTING 0915gcn_031-032.indd 32 8/31/15 9:39 AM