Source Technologies SECURE MICR PRINTER ST9612 User Manual

Page 30

Advertising
background image

Source Technologies, LLC ST9612 Secure MICR Printer User’s Guide

26

This also provides for inventory control of blank check stock. This number
should not be linked or be equal to the check serial number due to the
potential of double feeding in laser printers.

Note:

These features serve as a general guide for check security. You

should not consider these features as an all inclusive list. We
recommend consulting with your paper supplier for any additional
comments or suggestions.

4. Firms accepting checks should be aware of damaged MICR lines.

Intentionally damaging the MICR line can increase the time necessary to
process an item, giving the forger enough time to leave town. Also be
sensitive to discoloration, this could be an indication of alteration.


5. Safeguard check stock paper, and limit access only to necessary employees.

6. When generating final negotiable items:

The document always includes the amount value in words

The document should not include information that limits the value

range, i.e. “Not valid over $500.” This only guides the fraudulent
attempt. Use your application software to detect out of range items

All levels of hardware and software password protection should be

utilized

7. Understand and approve the security procedures of your check stock

suppliers to safeguard stock in their custody.

8. Use “Positive Pay” check services from your financial institution. You should

provide the check number, check date, dollar amounts, and sometimes the
payee name to your bank when checks are issued. The bank will match these
values and alert you to mismatches before clearing the check to your
account. Financial institutions should encourage full participation of corporate
clients.

9. Move methods of fraud detection to the item’s point of entry into the clearing

system. For example, low cost readers can detect low magnetic strength in
the MICR line which is a good indication of attempts to copy an original.

10. Review and document your internal negotiable document printing procedures.

Investigate employee backgrounds before assigning security authority. Split
the responsibilities. For example, an accounts payable production/security
officer should not also balance the account.

Security Issues | 5

Advertising