Section 3 - system planning and implementation, Introduction, Maintaining micr security – TROY Group MICR_IRD 4300 Security Printing Solutions User’s Guide User Manual
Page 40
Section 3
System Planning and Implementation
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. D
3-1
Introduction
Maintaining
MICR
Security
Before setting up and installing your TROY Security Printing Solution, TROY highly recommends that you
invest some time to plan the implementation and configuration of your security printing system. Some advance
planning will save you time during the setup process and will help to optimize the day-to-day operation of your
security printing system. Use the following implementation steps as a guide in developing your specific
implementation strategy.
In addition to the standard printing features of the Hewlett-Packard LaserJet printers, TROY Security Printing
Solutions provide many additional security enhancements. These features prevent unauthorized access to your
proprietary printer resources (security fonts, digitized signatures, logos, macros, etc.), settings, passwords, audit
data and/or unauthorized printing of your MICR documents. TROY strongly recommends that you take proper
precautions to prevent fraud, forgery, and accidental error, both inside and outside your organization. Some basic
precautions include the following:
• Controlling access to your printer’s security features (keys, network access, PINs, and passwords).
• Reconciling bank statements promptly to detect errors or misuse.
• Employing software-based security measures (user names and passwords).
• Using TROY MICR security paper with a preprinted security background, or using the printer’s built-
in TROYmark
™
feature to automatically print a security background design on your checks, making
check duplication or alternation difficult.
NOTE: It is the administrator’s responsibility to ensure proper procedures and safeguards are in place to provide
the necessary security for your MICR printing environment.