Physical Security; Restricting Physical Access - Xerox 6100BD - Phaser Color Laser Printer Fundamentals

Generic micr fundamentals guide
Hide thumbs Also See for 6100BD - Phaser Color Laser Printer:
Table of Contents

Advertisement

Security

Physical security

Access to printing
system
Access to media
8-2
Important characteristics of a good security system are:
Restricted access to printing capabilities
Protection of the system software and key files
Establishment of a complete and unalterable audit trail.
Use of document security features that protect against both
alteration and duplication
The primary aspects of physical security for the Xerox MICR
printing systems include the following.

Restricting physical access

The most important security feature is control of access to check
printing facilities and to the MICR printing system. If access is
sufficiently limited, you may not need to consider further security
procedures. However, as usage increases, the number of people
who need access to the printer also increases.
Therefore, the first step in implementing any sort of security
process must include a means of controlling the group of people
who have access to the printing system, as well as limiting what
they can bring to, or remove from, the printer environment.
For a higher level of security, the following is recommended:
Install alarms on all doors to at least indicate if they are
opened.
Do not admit visitors unless they are properly screened by
authorized managers.
Provide proper escorts and do not allow free access to any
visitor.
A Xerox MICR application consists of a combination of fonts,
logos, signatures, and forms. One way to secure these files is to
place them on media that can be physically secured. When
these application resource files are located on the host
computer, host access control is needed.
Generic MICR Fundamentals Guide

Advertisement

Table of Contents
loading

Table of Contents