Source Technologies MICR ST9650 User Manual
Page 30
Source Technologies, LLC ST9650 Secure MICR Printer User’s Guide
30
should not be linked or be equal to the check serial number due to the
potential of double feeding in laser printers.
Note:
These features serve as a general guide for check security. You
should not consider these features as an all inclusive list. We
recommend consulting with your paper supplier for any additional
comments or suggestions.
4. Firms accepting checks should be aware of damaged MICR lines.
Intentionally damaging the MICR line can increase the time necessary to
process an item, giving the forger enough time to leave town. Also be
sensitive to discoloration, this could be an indication of alteration.
5. Safeguard check stock paper, and limit access only to necessary employees.
6. When generating final negotiable items:
•
The document always includes the amount value in words
•
The document should not include information that limits the value
range, i.e. “Not valid over $500.” This only guides the fraudulent
attempt. Use your application software to detect out of range items
•
All levels of hardware and software password protection should be
utilized
7. Understand and approve the security procedures of your check stock
suppliers to safeguard stock in their custody.
8. Use “Positive Pay” check services from your financial institution. You should
provide the check number, check date, dollar amounts, and sometimes the
payee name to your bank when checks are issued. The bank will match these
values and alert you to mismatches before clearing the check to your
account. Financial institutions should encourage full participation of corporate
clients.
9. Move methods of fraud detection to the item’s point of entry into the clearing
system. For example, low cost readers can detect low magnetic strength in
the MICR line which is a good indication of attempts to copy an original.
10. Review and document your internal negotiable document printing procedures.
Investigate employee backgrounds before assigning security authority. Split
the responsibilities. For example, an accounts payable production/security
officer should not also balance the account.
Security Issues | 5