Xerox 6180N - Phaser Color Laser Printer 사용자 설명서 - 페이지 27

{카테고리_이름} Xerox 6180N - Phaser Color Laser Printer에 대한 사용자 설명서을 온라인으로 검색하거나 PDF를 다운로드하세요. Xerox 6180N - Phaser Color Laser Printer 32 페이지. Color laser printer
Xerox 6180N - Phaser Color Laser Printer에 대해서도 마찬가지입니다: 설치 매뉴얼 (34 페이지), 사양 시트 (2 페이지), 사용자 설명서 (32 페이지), 사용자 설명서 (28 페이지), 설치 매뉴얼 (2 페이지), 보안 매뉴얼 (38 페이지), 릴리스 노트 (2 페이지), 설치 매뉴얼 (2 페이지), 시작하기 매뉴얼 (37 페이지), 매뉴얼 (34 페이지), 매뉴얼 (34 페이지), 시작하기 매뉴얼 (34 페이지), 설치 및 운영 매뉴얼 (8 페이지), 평가자 매뉴얼 (16 페이지), 사양 (4 페이지)

Xerox 6180N - Phaser Color Laser Printer 사용자 설명서
who have access to the printing system, as well as limiting what
they can bring to, or remove from, the printer environment.
Controlling access to critical files
A combination of fonts, logos, signatures, and forms are used in
developing a Xerox MICR application. One approach to securing
these files is to place them on media that can be physically
secured.
The Xerox MICR fonts are supplied on CD ROMs in the ship kit for
the printers. These fonts can be loaded on the printer prior to
printing the MICR document, deleted from the printer after all
MICR jobs have been printed, and physically secured while the
diskette is not in use.
For PCL fonts (such as MICR, signature, and logo fonts), you
must restart the system after deleting the fonts, to ensure that the
fonts are completely removed from the system.
Securing paper stocks
The ability of the Xerox MICR printing system to print a form,
signature, logo, and MICR line on a check at the same time as the
variable data eliminates the security problems involved in keeping
a supply of preprinted checks in storage.
However, because the security paper constitutes one of several
resources used to print the checks, securing the paper stock is a
wise extra precaution. Paper stock should be kept in locked
storage, in sealed boxes, with each ream separately wrapped and
sealed.
The amount of paper brought out of storage for printing can be
used as an audit cross-check against the number of sheets
printed. After the check sheets are printed, the stacked
documents should be carefully secured, because loose sheets are
susceptible to pilfering.
Responsible presence
The key to physical security in any document generation process
is a responsible presence. An individual or group must have the
responsibility of safeguarding the printing process. For critical
applications, the responsibility usually lies with the auditing
operation. In small organizations, the printer operator may be
responsible for security.
Physical security, and the presence of a responsible individual or
group whenever the system and supplies are not secured, can
create a higher level of security. Thus, two persons can have
custody of the printing facility, either by dual-key access to the
physical media or by knowledge of a password to access the data
files and run the print job.
MICR User Guide
23