Security
Physical security
Access to printing
system
Access to media
8-2
Important characteristics of a good security system are:
•
Restricted access to printing capabilities
•
Protection of the system software and key files
•
Establishment of a complete and unalterable audit trail.
•
Use of document security features that protect against both
alteration and duplication
The primary aspects of physical security for the Xerox MICR
printing systems include the following.
Restricting physical access
The most important security feature is control of access to check
printing facilities and to the MICR printing system. If access is
sufficiently limited, you may not need to consider further security
procedures. However, as usage increases, the number of people
who need access to the printer also increases.
Therefore, the first step in implementing any sort of security
process must include a means of controlling the group of people
who have access to the printing system, as well as limiting what
they can bring to, or remove from, the printer environment.
For a higher level of security, the following is recommended:
•
Install alarms on all doors to at least indicate if they are
opened.
•
Do not admit visitors unless they are properly screened by
authorized managers.
•
Provide proper escorts and do not allow free access to any
visitor.
A Xerox MICR application consists of a combination of fonts,
logos, signatures, and forms. One way to secure these files is to
place them on media that can be physically secured. When
these application resource files are located on the host
computer, host access control is needed.
Generic MICR Fundamentals Guide