Breadcumbs
Main content

RICOH G800SE

Secure

Create images that can be trusted; prevent leaks

Store data (including movies) on tamper-proof writeonce memory cards NEW

Store data (including movies) on tamper-proof writeonce memory cards

The RICOH G800SE supports Sandisk SD WORM and Toshiba Write Once memory cards. Data stored on these cards can not be deleted or modified, making them ideal choice to replace film as original documentation in applications such as policing, fire-fighting, and defence, where the authenticity of image data may be called into question.

  • Note: SanDisk and Toshiba respectively provide SD WORM and Write Once memory cards to corporate entities through their distributors.

Password protection restricts access to a variety of camera functions

Password-protect the entire camera or internal memory or require a password only for USB access or to modify camera settings. Access can be granted by scanning a password barcode or entering the password using the camera’s onscreen keyboard.

Create up to 2 passwords NEW

Create separate user and administrator passwords. The administrator can restrict access to functions used on-site, for example to prevent unintended changes to camera settings when the camera is used in the workplace.

  Administrator User
Camera access
Menu access
Viewing internal memory
USB connection
SD-WO only
Web access
  • Administrator password takes priority.

Password protection for memory cards NEW

Two types of SD memory cards can be password protected: SDHC and SDXC. Password-protecting memory cards prevents images falling into the wrong hands should the card be lost or stolen.

  • Note: Do not forget your password. Password-protection can not be removed by support personnel.
  • Note: Before use, check that your memory card supports password-protection.

Edit detection ensures image authenticity

The RICOH G800SE is equipped with extremely accurate edit detection that makes digital images submitted as evidence more likely to be trusted. RSA encryption enables edit detection for entire images, which can be imported to the supplied EC1 software for a highly accurate determination of whether or not the image has been tampered with.

  • Note: Requires the supplied EC1 software.
A digital signature is embedded in an image taken in edit detection mode.

Date/time of recording: July 7, 2014/10:40:00

A digital signature is embedded in an image taken in edit detection mode.

Changes to the image, such as retouching or changing the date of recording, create inconsistencies in the digital signature.

Date/time of recording: August 7, 2014/10:40:00

Changes to the image, such as retouching or changing the date of recording, create inconsistencies in the digital signature.

The supplied software inspects the signature for consistency to determine whether or not the image has been modified.

Note: Composite image; actual display not shown.

The supplied software inspects the signature for consistency to determine whether or not the image has been modified.