IBM 1352 User Guide - Page 19

Use public sources such as phone books to verify phone numbers.

Page 19 highlights

Section 5: Security Issues 8. Move methods of fraud detection to the item's point of entry into the clearing system. For example, low cost readers can detect low magnetic strength in the MICR line which is a good indication of attempts to copy an original. 9. Always verify the home address and place of employment of new account applicants. Use public sources such as phone books to verify phone numbers. Ask new account applicants why they are opening an account with your institution. Be suspect of unusual answers or delays in responding. 10. Stay abreast of current check fraud methods and the latest in fraud detection. Offer seminars to educate corporate clients. 11. Review and document your internal negotiable document printing procedures. Investigate employee backgrounds before assigning security authority. Split responsibilities, for example, an accounts payable production/security officer should not also balance the account. Secure MICR Printer User's Guide July 2003 Page 15 © Source Technologies All rights reserved

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65

Secure MICR Printer User’s Guide
©
Source Technologies
July 2003
Page
15
All rights reserved
8. Move methods of fraud detection to the item’s point of entry into the clearing system.
For example, low cost readers can detect low magnetic strength in the MICR line which
is a good indication of attempts to copy an original.
9. Always verify the home address and place of employment of new account
applicants.
Use public sources such as phone books to verify phone numbers.
Ask
new account applicants why they are opening an account with your institution.
Be
suspect of unusual answers or delays in responding.
10. Stay abreast of current check fraud methods and the latest in fraud detection.
Offer seminars to educate corporate clients.
11.
Review and document your internal negotiable document printing procedures.
Investigate employee backgrounds before assigning security authority.
Split
responsibilities, for example, an accounts payable production/security officer should
not also balance the account.
Section 5: Security Issues