Xerox 6180N Generic MICR Fundamentals Guide  - Page 145

Cost considerations

Page 145 highlights

Security • Select a good check design. Review the design features that are effective against counterfeiting. Consult with the security officer at your bank and with your check supplier when considering specific protections. • Install reconciliation procedures. Make sure that accounts are posted promptly, and that bank statements are balanced immediately upon receipt. Inspect all checks in the statement to ensure that counterfeits are included. Cost considerations Some methods of preventing alteration and duplication are costly. Intaglio surfaces are probably the most effective and the most expensive. Overprinting is somewhat less expensive, but there are hidden costs in terms of speed of operation, damaged documents, and operational problems. The most popular protection method is safety paper. If the applications design permits its use, a safety paper is one reasonable way to protect a document against modification. The most inexpensive and effective method for protecting documents is by printing controlled information in a way that makes it difficult to alter. If information can be printed more than once, a tamperer would have difficulty making the changes look the same. An effective combination of methods uses the following: • A printing process that provides a good bonding between the ink and the paper • A font that is difficult to alter for the areas of the document that need protection but are not intended for machine readability • A redundant statement of the check amount • Use of at least two security features on the check, one to address alteration and another to address duplication Generic MICR Fundamentals Guide 8-17

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172

Security
Generic MICR Fundamentals Guide
8-17
Select a good check design.
Review the design features
that are effective against counterfeiting. Consult with the
security officer at your bank and with your check supplier
when considering specific protections.
Install reconciliation procedures.
Make sure that accounts
are posted promptly, and that bank statements are balanced
immediately upon receipt. Inspect all checks in the statement
to ensure that counterfeits are included.
Cost considerations
Some methods of preventing alteration and duplication are
costly. Intaglio surfaces are probably the most effective and the
most expensive. Overprinting is somewhat less expensive, but
there are hidden costs in terms of speed of operation, damaged
documents, and operational problems.
The most popular protection method is safety paper. If the
applications design permits its use, a safety paper is one
reasonable way to protect a document against modification.
The most inexpensive and effective method for protecting
documents is by printing controlled information in a way that
makes it difficult to alter. If information can be printed more than
once, a tamperer would have difficulty making the changes look
the same.
An effective combination of methods uses the following:
A printing process that provides a good bonding between the
ink and the paper
A font that is difficult to alter for the areas of the document
that need protection but are not intended for machine
readability
A redundant statement of the check amount
Use of at least two security features on the check, one to
address alteration and another to address duplication