TROY Group 3005 用户指南

下载
页码 160
 
Section 3 
System Planning and Implementation 
 
 
Security Printing Solutions User’s Guide -- 50-70410-002 Rev. A
 
3-1
 
Introduction 
 
 
 
 
Maintaining 
MICR 
Security 
 
 
 
 
 
 
 
 
 
Before setting up and installing your TROY Security Printing Solution, TROY highly recommends that you 
invest some time to plan the implementation and configuration of your security printing system.  Some advance 
planning will save you time during the setup process and will help to optimize the day-to-day operation of your 
security printing system.  Use the following implementation steps as a guide in developing your specific 
implementation strategy. 
 
 
In addition to the standard printing features of the Hewlett-Packard LaserJet printers, TROY Security Printing 
Solutions provide many additional security enhancements.  These features prevent unauthorized access to your 
proprietary printer resources (security fonts, digitized signatures, logos, macros, etc.), settings, passwords, audit 
data and/or unauthorized printing of your MICR documents.  TROY strongly recommends that you take proper 
precautions to prevent fraud, forgery, and accidental error, both inside and outside your organization.  Some basic 
precautions include the following: 
 
•  Controlling access to your printer’s security features (keys, network access, PINs, and passwords). 
•  Reconciling bank statements promptly to detect errors or misuse. 
•  Employing software-based security measures (user names and passwords). 
•  Using TROY MICR security paper with a preprinted security background, or using the printer’s built-in 
TROYmark
 feature to automatically print a security background design on your checks, making check 
duplication or alternation difficult. 
 
NOTE: It is the administrator’s responsibility to ensure proper procedures and safeguards are in place to provide 
the necessary security for your MICR printing environment.