Security8-4 Generic MICR Fundamentals GuideResponsible presenceThe key to security in any document generation process is anindividual or group that is responsible for safeguarding theprinting process. For critical applications, the auditing operationhas this responsibility. In small organizations, the printer operatormay be responsible for security.You can create a higher security level by combining physicalsecurity with a responsible individual or group when the systemand supplies are not secured. Thus, two persons can haveresponsibility for the printing facility, by either dual key access tothe media or knowing a password to access the data files andrun the print job.Software securitySoftware security focuses on restricting access to key files toauthorized individuals.Many software features provide different levels of protection,from class level logon control to automatic deletion of files atcompletion of a print job.NOTE: Internal audit features vary depending on the printer andcontroller configuration. You must consider your equipmentcapabilities when assessing your auditing needs. Refer to yourprinter customer documentation for information on the securityand auditing features that are available to you, and theprocesses for enabling them.Logon levelsSeveral Xerox MICR printers provide some level of logon orpassword security as standard or an option. Many systems havea logon level at which the user files can be restricted from all ofthe other levels so they cannot be edited, deleted, or used byother jobs.MemoryFonts, logos, graphics, and other resource files may need to berestricted from other users. Even if these resources areadequately protected, unauthorized access could be obtainedthrough the residual contents of font memory or disk storage.