Xerox 6180N Generic MICR Fundamentals Guide  - Page 142

Avoiding counterfeit and stolen checks

Page 142 highlights

Security Dataglyph™ Dataglyph is a new technology that permits duplicate encoding of all variable data in a covert but machine readable form. Dataglyphs appear to be shaded areas. Under close examination, patterns of left and right tilted diagonal lines can be seen. When they are scanned and properly interpreted, these diagonal lines form a code that conveys a message. VOID pantograph VOID pantograph is a background printing technique that uses a variation in halftone screen frequencies or ink colors to spell out the word "void" on the face of the check. The word is invisible on the original document, but when the document is duplicated, "void" appears in several places across the face of the duplicate. In recent years, this device has become less popular due to its negative impact on those who have legitimate reasons for duplicating checks. Its effectiveness has also degraded due to improvement in color duplicating systems that permit the pantograph to be duplicated intact. Avoiding counterfeit and stolen checks The other side of the transaction process is represented by the checks a business issues to pay its obligations and employees. Failure to recognize and adequately address the risk inherent in the activity can result in larger losses than would be suffered by occasionally accepting a bad check from a customer. The principal threats include alterations, embezzlement, stolen checks, and counterfeits. Alteration Alterations may occur when a criminal steals a check and changes the amount, the payee information, or both, and then cashes or deposits the check. To guard against this, follow these guidelines: 8-14 Generic MICR Fundamentals Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172

Security
8-14
Generic MICR Fundamentals Guide
Dataglyph™
Dataglyph is a new technology that permits duplicate encoding
of all variable data in a covert but machine readable form.
Dataglyphs appear to be shaded areas. Under close
examination, patterns of left and right tilted diagonal lines can be
seen. When they are scanned and properly interpreted, these
diagonal lines form a code that conveys a message.
VOID pantograph
VOID pantograph is a background printing technique that uses a
variation in halftone screen frequencies or ink colors to spell out
the word “void” on the face of the check. The word is invisible on
the original document, but when the document is duplicated,
“void” appears in several places across the face of the duplicate.
In recent years, this device has become less popular due to its
negative impact on those who have legitimate reasons for
duplicating checks. Its effectiveness has also degraded due to
improvement in color duplicating systems that permit the
pantograph to be duplicated intact.
Avoiding counterfeit and stolen checks
The other side of the transaction process is represented by the
checks a business issues to pay its obligations and employees.
Failure to recognize and adequately address the risk inherent in
the activity can result in larger losses than would be suffered by
occasionally accepting a bad check from a customer. The
principal threats include alterations, embezzlement, stolen
checks, and counterfeits.
Alteration
Alterations may occur when a criminal steals a check and
changes the amount, the payee information, or both, and then
cashes or deposits the check. To guard against this, follow these
guidelines: