Restricting use of the machine
Security features ..................................................................................11-2
Passcode protection . ......................................................................11-2
Security reception .........................................................................11-3
PIN masking .................................................................................11-7
Copy protection ..................................................................................11-22
Chapter
11