Xerox Nuvera 144 MX Production Systems Руководство пользователя - Страница 26

Просмотреть онлайн или скачать pdf Руководство пользователя для Сервер печати Xerox Nuvera 144 MX Production Systems. Xerox Nuvera 144 MX Production Systems 32 страницы. Production system and digital production press, production media cart, perfecting production system
Также для Xerox Nuvera 144 MX Production Systems: Брошюра (4 страниц), Технические характеристики (2 страниц), Руководство пользователя (36 страниц), Руководство по эксплуатации (24 страниц)

Xerox Nuvera 144 MX Production Systems Руководство пользователя

Additional information

MICR output verification tools

Security

22
This section contains information that may be helpful for the user
of MICR on a FreeFlow Print Server system.
The MICR Positioning and Dimension Gauge (part number:
600T80025) is included in the MICR font and documentation kit
that is shipped with your MX printing system. You may also order
additional MICR verification tools, such as the Optical
Comparator. For detailed information on the use of these tools,
refer to the "Quality control" chapter of the Generic MICR
Fundamentals Guide.
Security (audit control) in the printing environment refers to the
features that prevent unauthorized access to privileged data or
forms that are not intended for general use.
There are many techniques available to protect checks and other
valuable documents after the printing cycle. While no security
method provides absolute protection, any feature that makes a
check harder to alter or reproduce is desirable, so long as it does
not impair the automated processing of the document.
Physical security
The primary aspects of physical security for the MX printers
include:
Physical access to the printer
Access to fonts, logos, and forms
Securing paper stock
Responsible presence
Physical access to the printer
The most important security feature is control of access to the
MICR printing system. If access is sufficiently limited, further
security procedures may not be necessary. However, as system
usage increases, the number of people who need access to it also
increases. Therefore, the first step in implementing any security
process must include a means of controlling the group of people
MICR User Guide