Xerox 6180N Generic MICR Fundamentals Guide  - Page 130

Install alarms on all doors to at least indicate if they are

Page 130 highlights

Security Important characteristics of a good security system are: • Restricted access to printing capabilities • Protection of the system software and key files • Establishment of a complete and unalterable audit trail. • Use of document security features that protect against both alteration and duplication Physical security The primary aspects of physical security for the Xerox MICR printing systems include the following. Restricting physical access Access to printing system The most important security feature is control of access to check printing facilities and to the MICR printing system. If access is sufficiently limited, you may not need to consider further security procedures. However, as usage increases, the number of people who need access to the printer also increases. Therefore, the first step in implementing any sort of security process must include a means of controlling the group of people who have access to the printing system, as well as limiting what they can bring to, or remove from, the printer environment. For a higher level of security, the following is recommended: • Install alarms on all doors to at least indicate if they are opened. • Do not admit visitors unless they are properly screened by authorized managers. • Provide proper escorts and do not allow free access to any visitor. Access to media A Xerox MICR application consists of a combination of fonts, logos, signatures, and forms. One way to secure these files is to place them on media that can be physically secured. When these application resource files are located on the host computer, host access control is needed. 8-2 Generic MICR Fundamentals Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172

Security
8-2
Generic MICR Fundamentals Guide
Important characteristics of a good security system are:
Restricted access to printing capabilities
Protection of the system software and key files
Establishment of a complete and unalterable audit trail.
Use of document security features that protect against both
alteration and duplication
Physical security
The primary aspects of physical security for the Xerox MICR
printing systems include the following.
Restricting physical access
Access to printing
system
The most important security feature is control of access to check
printing facilities and to the MICR printing system. If access is
sufficiently limited, you may not need to consider further security
procedures. However, as usage increases, the number of people
who need access to the printer also increases.
Therefore, the first step in implementing any sort of security
process must include a means of controlling the group of people
who have access to the printing system, as well as limiting what
they can bring to, or remove from, the printer environment.
For a higher level of security, the following is recommended:
Install alarms on all doors to at least indicate if they are
opened.
Do not admit visitors unless they are properly screened by
authorized managers.
Provide proper escorts and do not allow free access to any
visitor.
Access to media
A Xerox MICR application consists of a combination of fonts,
logos, signatures, and forms. One way to secure these files is to
place them on media that can be physically secured. When
these application resource files are located on the host
computer, host access control is needed.