Xerox 6180N Generic MICR Fundamentals Guide  - Page 144

With high quality duplicating and printing equipment readily

Page 144 highlights

Security Stolen checks Blank checks may be removed from the premises by employees, delivery personnel, service technicians, customers, emergency personnel, or burglars. Missing checks may not be noticed immediately. In some cases, checks are intentionally thrown away without secure disposition. Stolen checks that are successfully passed are the responsibility of the account holder, and the losses are usually not recovered. Guard against stolen checks by doing the following: • Secure the check supply. Make sure that all blank checks are stored in a secure place. Limit access to checks to a small number of authorized employees. • Secure the environment. Limit check writing to an area that unauthorized individuals cannot access, or schedule check writing when no one else is in the area. • Examine checks thoroughly. If an unauthorized entry occurs, such as during a burglary, fire, or medical emergency, make sure that no unissued checks are missing. • Enroll in a positive pay program. This program is effective against stolen checks because unlisted serial numbers are caught by the bank and are not paid. • Dispose of outdated check stock in a secure manner, preferably by burning or shredding. Counterfeits With high quality duplicating and printing equipment readily available, individuals with no training or experience can create presentations and reports that have a very professional appearance. Office copiers, color copiers, and computercontrolled laser printers are used in check counterfeiting. Like stolen checks, counterfeits that pass through the payment system are often the responsibility of the account holder, and not the bank. This is especially true when the check can be easily reproduced, or account reconciliation procedures do not ensure prompt discovery of the counterfeit. Consider the following when planning for a counterfeit protection program: 8-16 Generic MICR Fundamentals Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172

Security
8-16
Generic MICR Fundamentals Guide
Stolen checks
Blank checks may be removed from the premises by employees,
delivery personnel, service technicians, customers, emergency
personnel, or burglars. Missing checks may not be noticed
immediately. In some cases, checks are intentionally thrown
away without secure disposition. Stolen checks that are
successfully passed are the responsibility of the account holder,
and the losses are usually not recovered. Guard against stolen
checks by doing the following:
Secure the check supply.
Make sure that all blank checks
are stored in a secure place. Limit access to checks to a
small number of authorized employees.
Secure the environment.
Limit check writing to an area that
unauthorized individuals cannot access, or schedule check
writing when no one else is in the area.
Examine checks thoroughly.
If an unauthorized entry
occurs, such as during a burglary, fire, or medical emergency,
make sure that no unissued checks are missing.
Enroll in a positive pay program.
This program is effective
against stolen checks because unlisted serial numbers are
caught by the bank and are not paid.
Dispose of outdated check stock in a secure manner
,
preferably by burning or shredding.
Counterfeits
With high quality duplicating and printing equipment readily
available, individuals with no training or experience can create
presentations and reports that have a very professional
appearance. Office copiers, color copiers, and computer-
controlled laser printers are used in check counterfeiting. Like
stolen checks, counterfeits that pass through the payment
system are often the responsibility of the account holder, and not
the bank. This is especially true when the check can be easily
reproduced, or account reconciliation procedures do not ensure
prompt discovery of the counterfeit.
Consider the following when planning for a counterfeit protection
program: