Xerox 6180N Generic MICR Fundamentals Guide  - Page 129

Security - review

Page 129 highlights

8. Security The success and security of MICR printing depends on the implementation of security procedures, document security features, and commitment by the customer. Xerox printing systems security Security in the laser printing environment refers to features that prevent unauthorized access to privileged data or forms that are not intended for general use. To determine the degree of security that you need, you must evaluate the present risk and the value of what will be protected. Although any printing system may handle sensitive material, a MICR printing system is of special sensitivity, because outputs often include negotiable documents. The key to security of a Xerox MICR printing system is to control access to critical and sensitive files, and to keep track of the legitimate use of these files through audit procedures. The critical files vary depending on check printing application implementation. The most common are the MICR fonts, logos, check forms, and the check print file. NOTE: The available security and audit features may vary depending on the printer and controller configuration. You must consider your equipment capabilities when assessing your security needs. Periodic review is highly recommended, especially if equipment capabilities are upgraded or major system elements change. Many techniques are available to protect checks and other valuable documents after printing. No security method provides absolute protection, but any feature that makes a check harder to alter or reproduce is desirable if it does not impair the production and automated processing of the document. Generic MICR Fundamentals Guide 8-1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172

Generic MICR Fundamentals Guide
8-1
8.
Security
The success and security of MICR printing depends on the
implementation of security procedures, document security
features, and commitment by the customer.
Xerox printing systems security
Security in the laser printing environment refers to features that
prevent unauthorized access to privileged data or forms that are
not intended for general use.
To determine the degree of security that you need, you must
evaluate the present risk and the value of what will be protected.
Although any printing system may handle sensitive material, a
MICR printing system is of special sensitivity, because outputs
often include negotiable documents.
The key to security of a Xerox MICR printing system is to control
access to critical and sensitive files, and to keep track of the
legitimate use of these files through audit procedures. The
critical files vary depending on check printing application
implementation. The most common are the MICR fonts, logos,
check forms, and the check print file.
NOTE:
The available security and audit features may vary
depending on the printer and controller configuration. You must
consider your equipment capabilities when assessing your
security needs. Periodic review is highly recommended,
especially if equipment capabilities are upgraded or major
system elements change.
Many techniques are available to protect checks and other
valuable documents after printing. No security method provides
absolute protection, but any feature that makes a check harder to
alter or reproduce is desirable if it does not impair the production
and automated processing of the document.