TROY Group MICR_IRD 3015 Security Printing Solutions User’s Guide User Manual
Page 43
Section 3
System Planning and Implementation
Security Printing Solutions User’s Guide -- 50-
70540-001 Rev. A
3-4
Planning
Worksheet
Print out the following pages, and use this worksheet as a quick reference guide to ensure that you have covered
all the available options for implementing your TROY Security Printing Solution.
TROY MICR Secure Implementation Worksheet
Select a system administrator – manages user names, passwords, and PINs, sets printing system
configuration, handles check stock before and after printing, and installs printer drivers and other Windows
software as needed.
System Administrator __________________________________________
Identify signatories for company checks – consider digitizing the signatures for increased security and
printing efficiency. Customer digital images of signatures must be prepared at TROY before your printer
installation begins.
Signatory __________________________________ Signatory __________________________________
Signatory __________________________________ Signatory __________________________________
Determine the number of check styles needed – if more than two check styles, consider having TROY
provide custom digital images of your company logo and check designs to allow use of blank check paper for
all check printing jobs.
Check Styles Needed: ___________________________________________________________________
Select a high-quality security check stock – refer to the TROY MICR Basics Handbook for specifications.
Call your TROY representative for more information, suggestions, and pricing on preferred check stock.
Check Stock Brand _____________________________________ Part Number _____________________
Determine who will have access to blank/printed check paper and printing software – distribute printer
security keys appropriately in accordance with your internal security guidelines. Store the second set of keys
in a secure location.
Backup key storage location _______________________________________________________________
Paper Tray Key Person _________________________ Printer Keylock Person ______________________
Determine how check data will be sent to the TROY printer – if using the Internet or a public intranet, we
strongly recommend using encryption (TROY MICR Secure EX printers only) to prevent unauthorized access
and/or fraudulent use of the check data sent to the printer.
Use Encryption? Yes ____ No ____ Decryption Password ______________________________________