Xerox 6180N Generic MICR Fundamentals Guide - Page 130
Install alarms on all doors to at least indicate if they are
UPC - 095205425307
View all Xerox 6180N manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 130 highlights
Security Important characteristics of a good security system are: • Restricted access to printing capabilities • Protection of the system software and key files • Establishment of a complete and unalterable audit trail. • Use of document security features that protect against both alteration and duplication Physical security The primary aspects of physical security for the Xerox MICR printing systems include the following. Restricting physical access Access to printing system The most important security feature is control of access to check printing facilities and to the MICR printing system. If access is sufficiently limited, you may not need to consider further security procedures. However, as usage increases, the number of people who need access to the printer also increases. Therefore, the first step in implementing any sort of security process must include a means of controlling the group of people who have access to the printing system, as well as limiting what they can bring to, or remove from, the printer environment. For a higher level of security, the following is recommended: • Install alarms on all doors to at least indicate if they are opened. • Do not admit visitors unless they are properly screened by authorized managers. • Provide proper escorts and do not allow free access to any visitor. Access to media A Xerox MICR application consists of a combination of fonts, logos, signatures, and forms. One way to secure these files is to place them on media that can be physically secured. When these application resource files are located on the host computer, host access control is needed. 8-2 Generic MICR Fundamentals Guide