Xerox 6180N Generic MICR Fundamentals Guide - Page 129
Security - review
UPC - 095205425307
View all Xerox 6180N manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 129 highlights
8. Security The success and security of MICR printing depends on the implementation of security procedures, document security features, and commitment by the customer. Xerox printing systems security Security in the laser printing environment refers to features that prevent unauthorized access to privileged data or forms that are not intended for general use. To determine the degree of security that you need, you must evaluate the present risk and the value of what will be protected. Although any printing system may handle sensitive material, a MICR printing system is of special sensitivity, because outputs often include negotiable documents. The key to security of a Xerox MICR printing system is to control access to critical and sensitive files, and to keep track of the legitimate use of these files through audit procedures. The critical files vary depending on check printing application implementation. The most common are the MICR fonts, logos, check forms, and the check print file. NOTE: The available security and audit features may vary depending on the printer and controller configuration. You must consider your equipment capabilities when assessing your security needs. Periodic review is highly recommended, especially if equipment capabilities are upgraded or major system elements change. Many techniques are available to protect checks and other valuable documents after printing. No security method provides absolute protection, but any feature that makes a check harder to alter or reproduce is desirable if it does not impair the production and automated processing of the document. Generic MICR Fundamentals Guide 8-1