Accounting And Access Rights Overview - Hasler IM-460 User Manual

Hide thumbs Also See for IM-460:
Table of Contents

Advertisement

Accounting and Access Rights Overview

5.1
Accounting and Access Rights
Overview
Postage Tracking and Access Control
Your mailing system includes functions that allow you to implement the following se-
curity and accounting requirements:
Track the usage that is made of postage: the Accounts function
Control the access of the users to the machine: the Access Control function.
You can activate these two functions independently. If both are activated, you can, to
better compartmentalize the expenses, allocate each user certain accounts only.
The Accounts Function
Activating the Accounts function in the mailing system is a convenient way to track
postage expenses by, for example, associating accounts to departments in your or-
ganization (Marketing, Sales, etc.) or to different companies, if the mailing system is
shared.
When the Accounts function is activated, the currently selected account is charged
each time the user applies postage to mail.
Then you can issue reports on the usage of each account, or groups and subgroups
of accounts, according to the structure of accounts you have defined as supervisor
(for information about reports, see Reports p.107).
Accounts from the User's Perspective
If the Accounts function is activated, users of the mailing system have to select an
account when starting their work session.
Afterwards, the user can change the account to charge according to the mail that has
to be processed.
The Access Control Function
As supervisor, you can set the mailing system to ask for a PIN code when a user
wakes up the machine to start a session.
This allows you to protect the machine and restrict the usage of its funds.
The different access control policies you can implement as supervisor are:
No PIN code: access to the machine is free
Unique system PIN code: users enter the PIN code to access the machine
Personal PIN codes: users enter their PIN code to access the machine.
In this last mode, the operators use only the accounts you allow them to access to.
To control the use of funds, each account can be allocated a bud-
get that cannot be overrun. This optional feature is described in
the Advanced Reporting User Guide.
5
81

Advertisement

Table of Contents
loading

Table of Contents