Xerox DocuPrint 100MX Manuel de l'utilisateur - Page 26

Parcourez en ligne ou téléchargez le pdf Manuel de l'utilisateur pour {nom_de_la_catégorie} Xerox DocuPrint 100MX. Xerox DocuPrint 100MX 32 pages. Freeflow print server micr user guide
Également pour Xerox DocuPrint 100MX : Brochure (4 pages), Spécifications (2 pages), Manuel de l'utilisateur (40 pages), Manuel d'installation (2 pages), Manuel de sécurité (38 pages)

Xerox DocuPrint 100MX Manuel de l'utilisateur

Additional information

MICR output verification tools

Security

22
This section contains information that may be helpful for the user
of MICR on a FreeFlow Print Server system.
The MICR Positioning and Dimension Gauge (part number:
600T80025) is included in the MICR font and documentation kit
that is shipped with your MX printing system. You may also order
additional MICR verification tools, such as the Optical
Comparator. For detailed information on the use of these tools,
refer to the "Quality control" chapter of the Generic MICR
Fundamentals Guide.
Security (audit control) in the printing environment refers to the
features that prevent unauthorized access to privileged data or
forms that are not intended for general use.
There are many techniques available to protect checks and other
valuable documents after the printing cycle. While no security
method provides absolute protection, any feature that makes a
check harder to alter or reproduce is desirable, so long as it does
not impair the automated processing of the document.
Physical security
The primary aspects of physical security for the MX printers
include:
Physical access to the printer
Access to fonts, logos, and forms
Securing paper stock
Responsible presence
Physical access to the printer
The most important security feature is control of access to the
MICR printing system. If access is sufficiently limited, further
security procedures may not be necessary. However, as system
usage increases, the number of people who need access to it also
increases. Therefore, the first step in implementing any security
process must include a means of controlling the group of people
MICR User Guide