beautypg.com

TROY Group MICR_IRD 3015 Security Printing Solutions User’s Guide User Manual

Page 43

background image

Section 3

System Planning and Implementation

Security Printing Solutions User’s Guide -- 50-

70540-001 Rev. A

3-4

Planning
Worksheet

Print out the following pages, and use this worksheet as a quick reference guide to ensure that you have covered
all the available options for implementing your TROY Security Printing Solution.


TROY MICR Secure Implementation Worksheet

Select a system administrator – manages user names, passwords, and PINs, sets printing system
configuration, handles check stock before and after printing, and installs printer drivers and other Windows
software as needed.

System Administrator __________________________________________

Identify signatories for company checks – consider digitizing the signatures for increased security and
printing efficiency. Customer digital images of signatures must be prepared at TROY before your printer
installation begins.

Signatory __________________________________ Signatory __________________________________

Signatory __________________________________ Signatory __________________________________

Determine the number of check styles needed – if more than two check styles, consider having TROY
provide custom digital images of your company logo and check designs to allow use of blank check paper for
all check printing jobs.

Check Styles Needed: ___________________________________________________________________

Select a high-quality security check stock – refer to the TROY MICR Basics Handbook for specifications.
Call your TROY representative for more information, suggestions, and pricing on preferred check stock.

Check Stock Brand _____________________________________ Part Number _____________________

Determine who will have access to blank/printed check paper and printing software – distribute printer
security keys appropriately in accordance with your internal security guidelines. Store the second set of keys
in a secure location.

Backup key storage location _______________________________________________________________

Paper Tray Key Person _________________________ Printer Keylock Person ______________________

Determine how check data will be sent to the TROY printer – if using the Internet or a public intranet, we
strongly recommend using encryption (TROY MICR Secure EX printers only) to prevent unauthorized access
and/or fraudulent use of the check data sent to the printer.

Use Encryption? Yes ____ No ____ Decryption Password ______________________________________