User's Manual Part 1

FEATURES
Applications
M
X
800 SERIES INSTALLATION GUIDE 11
V
E
R
I
F
O
N
E
C
O
N
F
I
D
E
N
T
IA
L
T
E
M
P
L
A
T
E
R
E
V
E
Figure 1 M
x
870 Terminal with Privacy Shield
Applications
Standard payment applications are available from VeriFone to interface with most
ECR's. Applications for the two families of terminals are written using a C based
programming language. These programs can be downloaded directly from an
ECR, another terminal, or a development PC using the M
x
800 Series terminal
system modes.
Terminal system mode can also be used for diagnostics, changing the password,
and Master Key injection. For further information on system mode, see Chapter 4.
Total Cost of
Ownership
M
x
800 Series terminal have been designed to be flexible and “future proof',
delivering an exceptional total cost of ownership.
The modular terminals can be configured at the factory or in the field by a trained
technician. The terminals can be purchased with necessary modules equipped to
meet today's requirements and other capabilities can be added as and when
needed.
This can include modules with Ethernet and USB connectivity, signature capture,
EMV 4.0 Type Approved smart card support, or contactless smart card support.
NOTE
"The tester will verify the physical properties of the privacy screen. The privacy
screen of an attended device shall provide protection as described in Appendix
A, section A.1 of this document. Alternatively, the vendor may use less restrictive
privacy shield criteria provided that the vendor supplies rules and guidance as to
how the visual observation is to be deterred by the environment in which the PED
is installed. These rules shall be binding for the organization placing the PED into
the environment, e.g., the acquirer or merchant. If the vendor gives rules for an
external physical privacy shield, then the vendor shall provide a demo/sample
with the appropriate dimensions. The tester shall examine the information to
verify the assertions of the vendor. The tester shall consider the examples
included in Appendix A, section A.2, of this document when evaluating the
vendor's visual observation deterrence rules. The user (acquirer or merchant)
instructions provided by the vendor shall clearly state the acquirer or merchant
must meet the implementation criteria or else deploy PEDs meeting the criteria
defined in Appendix A, section A1."