- ページ 26

ソフトウェア Xerox 6100BD - Phaser Color Laser PrinterのPDF ユーザーマニュアルをオンラインで閲覧またはダウンロードできます。Xerox 6100BD - Phaser Color Laser Printer 32 ページ。 Disk overwrite installation and usage
Xerox 6100BD - Phaser Color Laser Printer にも: インストレーション・マニュアル (34 ページ), 仕様 (2 ページ), ユーザーマニュアル (32 ページ), パンフレット&スペック (4 ページ), ユーザーマニュアル (28 ページ), インストールマニュアル (2 ページ), セキュリティ・マニュアル (38 ページ), インストールマニュアル (2 ページ), リリースノート (2 ページ), スタートマニュアル (37 ページ), マニュアル (34 ページ), マニュアル (34 ページ), スタートマニュアル (34 ページ), マニュアル (11 ページ), 設置および操作マニュアル (8 ページ)

Xerox 6100BD - Phaser Color Laser Printer ユーザーマニュアル

Additional information

MICR output verification tools

Security

22
This section contains information that may be helpful for the user
of MICR on a FreeFlow Print Server system.
The MICR Positioning and Dimension Gauge (part number:
600T80025) is included in the MICR font and documentation kit
that is shipped with your MX printing system. You may also order
additional MICR verification tools, such as the Optical
Comparator. For detailed information on the use of these tools,
refer to the "Quality control" chapter of the Generic MICR
Fundamentals Guide.
Security (audit control) in the printing environment refers to the
features that prevent unauthorized access to privileged data or
forms that are not intended for general use.
There are many techniques available to protect checks and other
valuable documents after the printing cycle. While no security
method provides absolute protection, any feature that makes a
check harder to alter or reproduce is desirable, so long as it does
not impair the automated processing of the document.
Physical security
The primary aspects of physical security for the MX printers
include:
Physical access to the printer
Access to fonts, logos, and forms
Securing paper stock
Responsible presence
Physical access to the printer
The most important security feature is control of access to the
MICR printing system. If access is sufficiently limited, further
security procedures may not be necessary. However, as system
usage increases, the number of people who need access to it also
increases. Therefore, the first step in implementing any security
process must include a means of controlling the group of people
MICR User Guide