Source Technologies 1352 MICR 40 manual Security Note

Page 18

Section 5: Security Issues

Security Note

Check fraud in the United States is a continuing problem. We have attempted to identify security features that can be incorporated into the base check stock. However, these may not prove 100% fraud preventative. Over time, technology will continue to develop new and improved measures to address check fraud.

The following internal and external security measures will help minimize your risk of check fraud.

1.Financial institutions should train tellers to look at the check, not the person presenting the check. The check, not the person, is the item that must be verified.

2.Firms accepting checks should be aware of damaged MICR lines. Intentionally damaging the MICR line can increase the time necessary to process an item, giving the forger enough time to leave town. Also be sensitive to discoloration, this could be an indication of alteration.

3.Incorporate security features into your base check stock and utilize printed security features that address both alteration and counterfeiting of original items. A short list of these features would be:

Warning Bands, or other methods that alert recipients to visual security features;

Artificial or genuine watermarks in the base paper;

Chemical additives in the base paper that react to chemical alteration attempts;

Void Pantographs that address attempts to copy original items;

Unique security fonts that deter attempts to alter payee or amount information.

4.When generating final negotiable items,

The document always includes the amount value in words;

The document should not include information that limits the value range, i.e. “Not valid over $500.” This only guides the fraudulent attempt. Use your application software to detect out of range items;

All levels of hardware and software password protection should be utilized.

5.Safeguard check stock paper, and limit access only to necessary employees.

6.Understand and approve the security procedures of your check stock suppliers to safeguard stock in their custody.

7.Use “Positive Pay” check services from your financial institution that match check number and dollar amounts to known information. Financial institutions should encourage full participation of corporate clients.

Secure MICR Printer User’s Guide July 2003

Page 14

© Source Technologies

All rights reserved

Image 18
Contents IBM Infoprint 1352 Micr Secure Micr Printer User’s Guide Page Table of Contents Error Messages Audit Trail ReportPrinter Installation Micr Overview Check Processing SystemMicr Printing Today Micr Overview Micr Check Design General Features of Check DesignPosition and Dimension Gauge Design Elements in Detail PaperData Elements Date DuplexingMicr Clear Band Amount Convenience AmountPayee Area Amount In WordsDollars Signature AreaAuxiliary On-Us Field Positions 65 to Account Title Memo LineCheck Serial Number Fractional Routing Number Micr Line External Processing Code EPC Field PositionRouting Field Positions 43 to On-Us Field Positions 32 toSample Check Quality Issues Quality WeightMicr Check Stock LayoutMoisture Security Issues Check Stock Security FeaturesSecurity Note Security Issues Micr Fonts Micr FeaturesMicr Mode Secure FontsBi-Directional Feedback @PJL Ustatus DeviceResource Storage Micr Menu Entering Micr Mode STF CommandSTH Command Set New Password Command &%STExxxxxxxx$ PasswordMicr Definition Command SMCPxxxx$ optional SmcpSMD STSPrint Micr E-13B Font SMDddd...ddd$ Print Micr CMC7 Font SM7ddd...ddd$Print MicroPrint Line SMMxxxxxxxxx!$ Print Secure Numeric Font SMFddd..ddd~Print ICR Secure Numeric Font &%SMIxxxxxx~ Load Flash Resource STLxxxxxyyyyyyzdd....ddTray Unlock Command STTU#$ Secure Flash Resource Unlock Command STPxxxxx$Tray Lock Command STTL#$ Tray Swapping CommandsDES and AES Decryption STDON$ Customer Character Conversation Command Special Alert and Custom Beep Command Turning Hex Transfer On IBM Host Programming Features and ExamplesHex Transfer Turning Hex Transfer OffHex Transfer Examples Micr Mode Command Example NON-NEGOTIABLE Commands in .1 in order of appearance STFPASSWORD$STY4000$ Escape Character TranslationSTY4040$ Example &%STY2300$Audit Trail Reports Print Audit Report Audit Report Field One SQ1d..d$ Audit Trail Report Command SetEnd Audit Record Audit Report Field Two-MICR Line SMDd..d$ or &%SM7d..d$Audit Report Field Six SQ6d..d$ Audit Report Field Four SQ4d..d~Audit Report Field Five SQ5d..d$ Audit Report Field Seven SQ7d..d$Print Audit Report SPRINTxx$ Print and Purge Audit Report &%SPURGExx$Spurge SprintSQ5 Start Audit Feedback CommandSQ4 SQ6Audit Trail Commands Example Void SQ1200$200 Command terminatorSAR$ SQ6October 5, 2005$SMD...$ SQ7103345 AM$Msmith Error Messages See list of Micr Error Messages on followingError Message On Display Printed Message Description Action Command&%SMDddd..ddd$ Appendix a E13B Micr Font MappingCommand SM7ddd..ddd$ Appendix B CMC7 Micr Font MappingCommand SMFddd...dd~ Appendix C Secure Numeric Font MappingExample &%SMF$1,123.00~ Will print Command SMIxxxxxx~ Appendix D ICR Secure Numeric Font MappingAppendix E Micr Mode Command Summary Description CommandAppendix F Audit Report Command Summary Description Command Structure FunctionPJL Unlock Sequence Appendix G PJL Based Micr CommandsFonts and Secured Resources PJL Re-Lock SequencePJL Re-Lock Sequence With a New Password Value PCL Font Call CommandsPJL Info Micr Command Cartridge Status = Unknown PCL Initial Set-Up PCL Macro CallPCL Font Calls, Positioning Commands and Variable Print Data Sample Accounts Payable Check PJL and PCL commands used to print the sample check @PJL Enter Language = PCL