欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ANSI ASC X9 X9 TG-8-2002 Check Security Guideline.pdf

    • 资源ID:431313       资源大小:264.99KB        全文页数:69页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ANSI ASC X9 X9 TG-8-2002 Check Security Guideline.pdf

    1、American NationalStandardfor Financial ServicesX9/TG-8-2002CHECK SECURITYGUIDELINESecretariat:American Bankers AssociationApproved September, 2001by X9 CommitteeX9/TG-8-2002, CHECK SECURITY GUIDELINEiFOREWORDThis technical guideline is a product of the Accredited Standards Committee X9 Financial Ser

    2、vices, and wasgenerated by the ASC X9B Checks Subcommittee. It is the result of a cooperative effort of Bankers, Check Printers,Equipment Manufacturers, and Paper Suppliers; and as such, is the first compilation of techniques for the reductionof check fraud encompassing the entire “life cycle of the

    3、 check.“ The guidelines referred to in this publication arecompatible with existing check standards and practices. Recommendations are based upon current and forecastedaspects of both technological and banking practices.These guidelines, while extensive in scope, do not cover all possible techniques

    4、 or preventative measures. Whilethere are no guarantees that these techniques or measures will prevent fraudulent uses of checks, they do providethe reader with the basics necessary to ascertain their vulnerability to check fraud.The revision of the X9/TG-8 Check Security Technical Guideline has bee

    5、n undertaken to ensure that TG-8 remainscurrent, in response to the experiences and needs in the US Payments System. Mr. Rick Youngblood of Bank ofAmerica (Charlotte) initially led the X9B11 Work Group for this revision. Rick also headed the Mid-Atlantic CheckFraud Task Force and ensured that the Wo

    6、rk Group members had timely information to consider. As work continued,Ms. Helene Kontonis of the Chase Manhattan Bank succeeded Mr. Youngblood as X9B11 Work Group Chair.Helene, with the help of the Work Group members, has accomplished the necessary revisions and additions to thisvaluable publicatio

    7、n. Final revisions for publication were completed by Mr. Curt Siroky, X9B Vice Chairman, John HHarland Company. At the time of its approval, the X9 Committee had the following members:Harold G. Deal, X9 Chairman, BB this starts the life cycle.2. The checks are either delivered to the CUSTOMER BANK (

    8、for bank testing and delivery to the customer) ordirectly to a CUSTOMER for their future use.3. The CUSTOMER then uses the checks according to his/her needs and provides them to certain parties(PAYEES) for payments.4. The PAYEE then DEPOSITS the check(s) at a BANK or endorses the check(s) over to an

    9、other party (eithersome company taking responsibility for processing for payment, or some party accepting the check as apayment), i.e., the SECOND ENDORSER.5. The DEPOSITS are received from the CUSTOMER by a TELLER, through the MAIL, NIGHT DEPOSITORYor ATM.6. The checks, having been received by a du

    10、ly authorized area of the BANK, are transported to a check-processing site. ENCODING if junked, the castings should be brokenX9/TG-8-2002, CHECK SECURITY GUIDELINE6up prior to disposal. In all cases the serial numbers and records of disposal should be retained for a period of no lessthan ten years.

    11、Paper supplies utilized by check manufacturers must be kept in secured areas. Employees should notbe allowed to have free access to areas where the actual check printing is taking place. Check manufacturersmust ensure that sales and manufacturing personnel have no previous criminal records that invo

    12、lve crimes relative tocounterfeiting or forgery. When a crime is committed which involves a document produced by a check vendor, fullcooperation with the appropriate law enforcement agency should be provided. Company records should be madeavailable for review as long as employee civil rights are not

    13、 violated.3.1.2 ADMINISTRATIONAll orders should be assigned a unique identity, and tracked throughout the check manufacturing process so that itsstate of completion and location in the production stream can be readily determined. Order monitoring shouldcontinue until proof of shipment is achieved. A

    14、ppropriate controls should be in place to ensure that completedcheck orders cannot be inadvertently or purposely shipped to an incorrect destination. Due to the nature of theseproducts, check vendors should be discreet and treat each order as a confidential document. All checkmanufacturing staff mem

    15、bers should remember that the inclusion of certain design and security features in checkorders could also be confidential. Documents should never be used as samples by vendors. Samples should nevercontain customer information of any sort, especially customer names or account numbers.3.1.3 SALES PRAC

    16、TICESAppropriate safeguards should be in place to ensure that all check orders accepted for production are legitimate.Checks should not be printed if drawn on a bank which does not exist, or an account that has been closed, or isotherwise restricted. Verification is also required for changes in ship

    17、ping destination, changes in printinginstructions for names or titles, unusual quantities, or out-of-sequence consecutive number ranges. Product samplesused for advertising or new customer education may be printed on real check stock, but should never carry a realcustomer name or financial instituti

    18、on identity. Sample MICR code-lines should not illustrate a real routing number oraccount number. Additionally, the document should be overprinted with a clear and obvious message that the checkis a sample and it is not negotiable.3.1.4 SUPPLIESAll blank check stock and specialty papers should be ke

    19、pt in a secure storage area. Where practical, inventories ofblank check stock should be packaged in pre-counted quantities and in tamper-evident units such as plastic shrink-wrap. Quantities of all sensitive materials should be verified on delivery, and all scrap, quality rejects and obsoleteitems s

    20、hould be shredded prior to disposal. On-hand inventory should be audited frequently to identify shortages.Printing supplies, such as paper, ink, and printing plates must be kept in secure storage areas. Unprinted reams androlls of paper, as well as pre-printed standard stock check bodies (awaiting p

    21、ersonal imprinting) should beinventoried on a regular basis. All spoiled documents should be shredded or incinerated. All unprinted securitypaper waste should be shredded prior to recycling. Plates used to print documents should be stored in secure areasor rendered useless prior to scrapping.3.1.5 P

    22、RINTINGPress operators should be carefully monitored and appropriate precautions should be taken to prevent the printing of“orders“ or “double orders“. All output, which fails to pass quality inspection, should be promptly shredded fordisposal. Used printing plates should be regularly collected, acc

    23、ounted for, and disposed of properly.X9/TG-8-2002, CHECK SECURITY GUIDELINE73.1.6 FACILITIESIt is important that access to check printing facilities be strictly controlled. Employees should not be allowed to takesecurity paper from the building unless cleared by a security officer. All security door

    24、s should have alarms that atleast indicate whether they are opened. Visitors should not be allowed unless properly screened by authorizedmanagers. These visits should be cleared by security and employees should be made aware of the visit. Properescorts must be provided, allowing no free access to an

    25、y visitor.3.1.7 EMPLOYEESEmployees should be made aware that they are depended upon to protect company integrity and customerinformation. Additionally, a full and complete background check of all prospective employees should proceed hiring.Credit history, criminal record, prior employment history an

    26、d personal references should be carefully examined (so faras it is consistent with individual rights). When appropriate, employment should be denied to those whose personalhistory offers evidence of unacceptable risk.3.2 CHECK STOCK RETAILERSDesktop software technologies have made it possible for en

    27、d users and businesses to completely print theirown checks using pre-decorated blank check stock. The printing of checks by end users and businessesrequires the use of magnetic ink or special toner cartridges for producing MICR characters. This ensures thatthese checks process properly in the reader

    28、/sorter machines used for processing checks in the US PaymentsSystem. Due diligence requires that the wise end user should purchase and use a secure paper stock thatpermits the checks he or she produces to be resistant to alteration and copying. The blank paper stock usedfor the printing of these ch

    29、ecks can be obtained from a variety of sources, including suppliers offering checkstock via the World Wide Web. Many retail office supply stores also offer this stock for sale both with andwithout the software used for printing the check. Because this blank paper stock could potentially be used ina

    30、fraudulent manner, it is important that resellers that offer these products for sale understand theramifications of these actions. It is in the best interest of local store retailers to control or limit the sale ofblank check stock because these same retailers are often times the victim of fraudulen

    31、t checks producedwith the very product that they sell. There is growing evidence that many fraudulent checks presented toretailers are generated on easy to obtained check stock.The following sub-clause outlines a number of precautions that retailers must take to safeguard access to this stock.3.2.1

    32、ACCESSIt is strongly recommend that once a retailer has made the decision to sell blank check stock, that increased securityof the stock and anonymousness of the purchaser be minimized. Blank check stock should be available from a lockedsales counter like other high dollar value products. Only autho

    33、rized store employees should have access to thelocked stock. This will safeguard the stock and require a face-to-face transaction for a customer to initiate andcomplete a purchase. It would also be advised that these authorized store employees be clear of any criminal recordsthat involve check fraud

    34、. All employees should be trained to look for suspicious behavior from potential purchasersof blank check stock.X9/TG-8-2002, CHECK SECURITY GUIDELINE84. CHECKS, DRAFTS AND MONEY ORDERSThis document principally addresses personal and commercial checks. However, the following ten clauses identifyothe

    35、r paper payment instruments in common use. Whether you are the payor, the payee, or represent the payorfinancial institution (or some other interested third party), you should understand the payment instrument beingused.4.1 BANK DRAFTSBank drafts are payment instruments written by a financial instit

    36、ution against its funds on deposit with anotherfinancial institution, e.g. tellers checks, domestic and foreign.4.2 CASHIERS CHECKS AND OFFICIAL CHECKSCashiers checks and bank official checks are direct obligations of the financial institution or bank holding company,drawn on the financial instituti

    37、on or bank holding company, and signed by an authorized employee on behalf of thefinancial institution or bank holding company. These instruments are used by the financial institution or bankholding company to settle its own obligations as well as used by bank customers who purchase them to settlepe

    38、rsonal obligations. Cashiers checks and bank official checks represent the obligation of the financial institution orbank holding company, as opposed to the obligation of an account holder because they are issued by a financialinstitution, which guarantees that the funds are available.Cashiers check

    39、s have several advantages over other kinds of checks and guarantee the check was fully completedprior to issue. Like all paper payment instruments, cashiers checks may be altered, stolen or counterfeited. If acashiers check is lost or stolen, the customer cannot demand reimbursement within 90 days o

    40、f issue, under UCC 3-312 (1990 revision). Lost or stolen certified checks have the same replacement problems.4.3 CERTIFIED CHECKSCertified checks are personal or business checks that have been presented to the issuing financial institution by theaccount holder or a third party for guarantee that the

    41、 check will be paid on presentment. As proof of certification, anauthorized party at the payor financial institution places a written, signed statement on the check (usually on its face)which guarantees payment. Typically, at the time of certification, the depositors account is debited for the amoun

    42、t ofthe check and the funds are set aside in a dedicated account at the payor financial institution. These funds are paidupon presentment. The process of certification shifts liability for payment of the item from the maker of the check tothe payor financial institution. In this sense, a certified c

    43、heck functions identically to a cashiers check or tellerscheck.The process of certification guarantees only that the account is valid and that, at the time of certification, sufficientfunds were present to cover the amount printed on the check as certified. It does not necessarily guarantee thevalid

    44、ity of the signature or the completion of the instrument, unless required by the certifying financial institution.Payor financial institutions have no obligation to certify checks drawn on their customers accounts.Certification procedures and markings vary from one financial institution to another a

    45、nd the appearance of certifiedchecks varies widely, since they may also be ordinary business or personal checks. Therefore, it may be difficult totell if a check has been fraudulently certified. Despite general perceptions, protection is only provided to the accountholder and to the payor financial

    46、institution if it validates all certified checks before payment. If a certified check islost or stolen, the customer cannot demand reimbursement within 90 days of issue, under UCC 3-312 (1990 revision).Lost or stolen cashiers checks have the same replacement problems.X9/TG-8-2002, CHECK SECURITY GUI

    47、DELINE94.4 DEMAND DRAFTSDemand drafts are written orders to pay the amount of the draft on sight, i.e., the presentment of a sight draft. A“check“ is a demand draft drawn on a bank or other financial institution.4.5 MONEY ORDERSMoney orders are issued by a Post Office, financial institution, or comp

    48、any, for payment of a specific sum of money.Two types of money orders exist. The first type is a product marketed by firms under strict security procedures of afranchise agreement with various outlets. The second type of money order is sold by individual institutions as aconvenience to their custome

    49、rs. Many money orders are like personal checks and are not obligations of the sellinginstitution, but are drawn on them. Both types are traditionally imprinted by check writing equipment that producesamounts that cannot be easily altered. A major difference between a money order issued by a financial institution,and one issued by a Post Office, is that the bank money order can be endorsed any number of times. A Postal moneyorder can only be endorsed once.4.6 PAYABLE-THROUGH-DRAFTSPayable-through-drafts are checks written on a financial institution, or other payor, but payable thro


    注意事项

    本文(ANSI ASC X9 X9 TG-8-2002 Check Security Guideline.pdf)为本站会员(fuellot230)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开