Source Technologies ST9530 manual Security Note

Page 17

Security Note

Check fraud in the United States is a continuing problem. We have attempted to identify security features that can be incorporated into the base check stock. However, these may not prove 100% fraud preventative. Over time, technology will continue to develop new and improved measures to address check fraud.

The following internal and external security measures will help minimize your risk of check fraud.

1.Financial institutions should train tellers to look at the check, not the person presenting the check. The check, not the person, is the item that must be verified.

2.Firms accepting checks should be aware of damaged MICR lines. Intentionally damaging the MICR line can increase the time necessary to process an item, giving the forger enough time to leave town. Also be sensitive to discoloration, this could be an indication of alteration.

3.Incorporate security features into your base check stock and utilize printed security features that address both alteration and counterfeiting of original items. A short list of these features would be:

Warning Bands, or other methods that alert recipients to visual security features;

Artificial or genuine watermarks in the base paper;

Chemical additives in the base paper that react to chemical alteration attempts;

Void Pantographs that address attempts to copy original items;

Unique security fonts that deter attempts to alter payee or amount information.

4.When generating final negotiable items,

The document always includes the amount value in words;

The document should not include information that limits the value range, i.e. “Not valid over $500.” This only guides the fraudulent attempt. Use your application software to detect out of range items;

All levels of hardware and software password protection should be utilized.

5.Safeguard check stock paper, and limit access only to necessary employees.

6.Understand and approve the security procedures of your check stock suppliers to safeguard stock in their custody.

Secure MICR Printer User’s Guide

13

© Source Technologies

September 2005

All Rights Reserved

Image 17
Contents ST9530 Secure Micr Printer User’s Guide Page Table of Contents Audit Trail Report Error MessagesPrinter Installation Micr Printing Today Micr OverviewCheck Processing System Secure Micr Printer User’s Guide Position and Dimension Gauge General Features of Check DesignMicr Check Design Design Elements in Detail PaperMicr Clear Band DuplexingData Elements Date Amount Convenience AmountPayee Area Amount In WordsSignature Area Drawee Institution NameCheck Serial Number Fractional Routing Number Micr Line Memo LineAuxiliary On-Us Field Positions 65 to External Processing Code EPC Field PositionOn-Us Field Positions 32 to Sample Check Quality Issues Micr Check Stock WeightQuality LayoutCheck Stock Security Features Security IssuesSecurity Note Secure Micr Printer User’s Guide Micr Mode Micr FeaturesMicr Fonts Secure Fonts@PJL Ustatus Device CODE=40020 MicroPrintBi-Directional Feedback Micr Menu Resource StorageSTF Command Entering Micr ModePassword STH CommandMicr Definition Command SMCPxxxx$ optional SmcpSTE Set New Password Command &%STExxxxxxxx$STS Print Micr E-13B Font SMDddd...ddd$Print Secure Numeric Font SMFddd..ddd~ Print Micr CMC7 Font SM7ddd...ddd$Print ICR Secure Numeric Font &%SMIxxxxxx~ Print MicroPrint Line SMMxxxxxxxxx!$Tray Lock Command STTL#$ Secure Flash Resource Unlock Command STPxxxxx$Load Flash Resource STLxxxxxyyyyyyzdd....dd Format Flash Memory SFF$Tray Swapping Commands Tray Unlock Command STTU#$STTU# SttsonDES and AES Decryption Decryption CommandsTurn AES Decryption on Turn DES Decryption onTurn DES Decryption OFF Turn AES Decryption OFFCustomer Character Conversation Command STBEEP2$ Special Alert and Custom Beep CommandSTBEEP1$ MICRpoint Feature Secure Micr Printer User’s Guide Hex Transfer IBM Host Programming Features and ExamplesTurning Hex Transfer On Turning Hex Transfer OffHex Transfer Examples Micr Mode Command Example STFPASSWORD$ Commands in .1 in order of appearanceCommand terminator Micr font character mapping in Appendix aSTY4040$ Escape Character TranslationSTY4000$ Example &%STY2300$Sample Check Audit Trail Reports Print Audit Report Audit Trail Report Command SetSAR End Audit RecordAudit Report Field Two-MICR Line Audit Report Field One SQ1d..d$Audit Report Field Three SQ3d..d$ Audit Report Field Four SQ4d..d~Audit Report Field Six SQ6d..d$ Audit Report Field Five SQ5d..d$Audit Report Field Seven SQ7d..d$ Print and Purge Audit Report &%SPURGExx$Print Audit Report SPRINTxx$ Start Audit Feedback CommandAudit Trail Commands Example Audit Trail Check Sample SQ1200$200 SAR$SQ6October 5, 2005$ TerminatorSQ7103345 AM$ SMD...$Msmith Error Message on Display Printed Message Error MessagesDescription ActionMacro Definition Error Invalid decode Page Example &%SMD 00001234 T01234567T3210987654321$ Will print Appendix a E13B Micr Font Mapping Command&%SMDddd..ddd$Appendix B CMC7 Micr Font Mapping Less Than Equal Greater Than Description Alpha/Numeric Hex Value Secure Font Character Appendix C Secure Numeric Font MappingTwo Three Four Five Six Seven Eight Nine Arrow Example&%SMF$15,575.00~ Appendix D ICR Secure Numeric Font Mapping Appendix E Micr Mode Command Summary STTSOFF$ STORE$ SPRINT$SPURGE$ Previous Audit Report information will be lostAppendix G PJL Based Micr Commands PJL Re-Lock Sequence With a New Password Value @PJL Info Micr UELCartridge Status = Unknown PCL Font Calls, Positioning Commands and Variable Print Data Sample Accounts Payable Check PJL and PCL commands used to print the sample check ESC%-12345X@PJL Ldeletepassword LRESOURCEflash