Xerox Nuvera 144 MX Production Systems Kullanıcı Kılavuzu - Sayfa 26

Yazdırma Sunucusu Xerox Nuvera 144 MX Production Systems için çevrimiçi göz atın veya pdf Kullanıcı Kılavuzu indirin. Xerox Nuvera 144 MX Production Systems 32 sayfaları. Production system and digital production press, production media cart, perfecting production system
Ayrıca Xerox Nuvera 144 MX Production Systems için: Broşür (4 sayfalar), Teknik Özellikler (2 sayfalar), Kullanıcı Kılavuzu (36 sayfalar), Operatör El Kitabı (24 sayfalar)

Xerox Nuvera 144 MX Production Systems Kullanıcı Kılavuzu

Additional information

MICR output verification tools

Security

22
This section contains information that may be helpful for the user
of MICR on a FreeFlow Print Server system.
The MICR Positioning and Dimension Gauge (part number:
600T80025) is included in the MICR font and documentation kit
that is shipped with your MX printing system. You may also order
additional MICR verification tools, such as the Optical
Comparator. For detailed information on the use of these tools,
refer to the "Quality control" chapter of the Generic MICR
Fundamentals Guide.
Security (audit control) in the printing environment refers to the
features that prevent unauthorized access to privileged data or
forms that are not intended for general use.
There are many techniques available to protect checks and other
valuable documents after the printing cycle. While no security
method provides absolute protection, any feature that makes a
check harder to alter or reproduce is desirable, so long as it does
not impair the automated processing of the document.
Physical security
The primary aspects of physical security for the MX printers
include:
Physical access to the printer
Access to fonts, logos, and forms
Securing paper stock
Responsible presence
Physical access to the printer
The most important security feature is control of access to the
MICR printing system. If access is sufficiently limited, further
security procedures may not be necessary. However, as system
usage increases, the number of people who need access to it also
increases. Therefore, the first step in implementing any security
process must include a means of controlling the group of people
MICR User Guide