Section 3 - system planning and implementation, Introduction, Maintaining micr security – TROY Group MICR_IRD 9000 1UP MICR Printing Solutions User’s Guide User Manual

Page 41

Advertising
background image

Section 3

System Planning and Implementation

MICR Solutions User’s Guide -- Document #50-70341-001 Rev. F

3-1

Introduction

Maintaining
MICR
Security


Before setting up and installing your TROY MICR solution, TROY highly recommends that you invest some
time to plan the implementation and configuration of your MICR printing system. Some advance planning will
actually save you time during the setup process and will help to optimize the day-to-day operation of your MICR
printing system. Use the following implementation steps as a guide in developing your specific implementation
strategy.


In addition to the standard printing features of the Hewlett-Packard LaserJet printers, the TROY MICR solutions
provide many additional security enhancements. These features prevent unauthorized access to your proprietary
printer resources (MICR fonts, digitized signatures, logos, macros, etc.), settings, passwords, audit data and/or
unauthorized printing of your MICR documents. TROY strongly recommends that you take proper precautions
to prevent fraud, forgery, and accidental error, both inside and outside your organization. Some basic precautions
include:

• Controlling access to your printer’s security features (keys, network access).
• Reconciling bank statements promptly to detect errors or misuse.
• Employing software-based security measures (user names and passwords).
• Using TROY MICR security paper with preprinted background patterns or use the printer’s built-in

TROYmark

feature (Secure EX printers only) to make check duplication or alternation difficult.

NOTE: It is the administrator’s responsibility to ensure proper procedures and safeguards are in place to provide
the necessary security for your MICR printing environment.


Advertising