TROY Group MICR_IRD 9000 1UP MICR Printing Solutions User’s Guide User Manual

Page 43

Advertising
background image

Section 3

System Planning and Implementation

MICR Solutions User’s Guide -- Document #50-70341-001 Rev. F

3-3

How to
Implement
the TROY
MICR Printing
System
(cont.)














Step 4: Select a high-quality, high-security check paper. Refer to the

TROY MICR Basics Handbook

for

information on check paper specifications before purchasing your check stock or call your TROY printer
representative for more information, suggestions and pricing.

Step 5:
Determine who in the organization should have access to blank check paper, to printed checks and to the
software that prints checks. To avoid fraud, the number of personnel who have access to these items should be
kept to a minimum. The first two individuals on your list should be given the keys to the locking printer input
trays (MICR Secure printers only). The latter individuals should be given a key to the printer keylock (MICR
Secure printers only). All key recipients should be advised of their security obligations and responsibilities.

NOTE: If you are installing a TROY MICR printer (not a MICR Secure printer), skip to Step 9.


Step 6:
Determine how check data will be sent to the MICR printer, either locally over a direct parallel
connection, or over an intranet or Internet connection. If check information is going to be transmitted across
public networks (e.g., across the Internet), encryption is strongly recommended so that print data cannot be
“tapped into” and used to commit check fraud. Encryption can also be used on internal networks if internal
security is a concern. Encryption is not recommended or required for direct (non-networked) connections
between a workstation and a TROY Secure and Secure EX series printer. If you choose to use the encryption
feature, you must select a secret password (or pass phrase) of up to 128 characters in length to be used in the
encryption/decryption process.

Step 7: Determine who will have access rights (via the host computer) to the MICR printer to print MICR
documents. Because TROY Secure EX printers provide user-level security, your MICR printer can be a shared
device for printing MICR and non-MICR documents. If this level of security is required in a shared
environment, the administrator should prepare a list from 1 to 19 user names and passwords (each not to exceed
eight characters in length in the range of A-Z and 0-9). All users, with the exception of the administrator, have
the same access privileges to secure resources stored in the printer. Therefore, it is advantageous to use multiple
user names. User names are also logged automatically in audit data records.

Step 8: Decide if either the TROYmark

and/or the TROY enhanced auditing feature will be used as security

measures (Secure EX printers only). If so, the administrator must decide which fonts are to be used to capture
check data for these features. A special TROY Messaging font can be used to insert data into TROYmark

or

audit data records using non-check data. Data capture fonts must be printer-resident and unified across check
types. Refer to Section 2 –

Understanding TROY’s Features

.

Advertising