Xerox DocuPrint 135MX Benutzerhandbuch - Seite 36
Blättern Sie online oder laden Sie pdf Benutzerhandbuch für Druck-Server Xerox DocuPrint 135MX herunter. Xerox DocuPrint 135MX 40 Seiten. Freeflow print server micr user guide
Auch für Xerox DocuPrint 135MX: Spezifikationen (2 seiten), Benutzerhandbuch (32 seiten)
Additional information
4-2
the first step in implementing any security process must
include a means of controlling the group of people who
have access to the printing system, as well as limiting
what they can bring to, or remove from, the printer
environment.
Controlling access to critical files
A combination of fonts, logos, signatures, and forms are
used in developing a Xerox MICR application. One
approach to securing these files is to place them on media
that can be physically secured.
The DocuPrint MX MICR fonts are supplied on one 3.5-
inch diskette in the ship kit for the printers. These fonts
can be loaded on the printer prior to printing the MICR
document, deleted from the printer after all MICR jobs
have been printed, and physically secured while the
diskette is not in use.
For PCL fonts (such as MICR, signature, and logo fonts),
you must restart the system after deleting the, to ensure
that the fonts are completely removed from the system.
Securing paper stocks
The ability of the Xerox MICR printing system to print a
form, signature, logo, and MICR line on a check at the
same time as the variable data eliminates the security
problems involved in keeping a supply of preprinted
checks in storage.
However, because the security paper constitutes one of
several resources used to print the checks, securing the
paper stock is a wise extra precaution. Paper stock
should be kept in locked storage, in sealed boxes, with
each ream separately wrapped and sealed.
The amount of paper brought out of storage for printing
can be used as an audit cross-check against the number
of sheets printed. After the check sheets are printed, the
stacked documents should be carefully secured, because
loose sheets are susceptible to pilfering.
Responsible presence
The key to physical security in any document generation
process is a responsible presence. An individual or group
must have the responsibility of safeguarding the printing
process. For critical applications, the responsibility usually
lies with the auditing operation. In small organizations, the
printer operator may be responsible for security.
Physical security, and the presence of a responsible
individual or group whenever the system and supplies are
not secured, can create a higher level of security. Thus,
two persons can have custody of the printing facility,
MICR User Guide