ANSI ASC X9 X9 TG-8-2002 Check Security Guideline.pdf
《ANSI ASC X9 X9 TG-8-2002 Check Security Guideline.pdf》由会员分享,可在线阅读,更多相关《ANSI ASC X9 X9 TG-8-2002 Check Security Guideline.pdf(69页珍藏版)》请在麦多课文档分享上搜索。
1、American NationalStandardfor Financial ServicesX9/TG-8-2002CHECK SECURITYGUIDELINESecretariat:American Bankers AssociationApproved September, 2001by X9 CommitteeX9/TG-8-2002, CHECK SECURITY GUIDELINEiFOREWORDThis technical guideline is a product of the Accredited Standards Committee X9 Financial Ser
2、vices, and wasgenerated by the ASC X9B Checks Subcommittee. It is the result of a cooperative effort of Bankers, Check Printers,Equipment Manufacturers, and Paper Suppliers; and as such, is the first compilation of techniques for the reductionof check fraud encompassing the entire “life cycle of the
3、 check.“ The guidelines referred to in this publication arecompatible with existing check standards and practices. Recommendations are based upon current and forecastedaspects of both technological and banking practices.These guidelines, while extensive in scope, do not cover all possible techniques
4、 or preventative measures. Whilethere are no guarantees that these techniques or measures will prevent fraudulent uses of checks, they do providethe reader with the basics necessary to ascertain their vulnerability to check fraud.The revision of the X9/TG-8 Check Security Technical Guideline has bee
5、n undertaken to ensure that TG-8 remainscurrent, in response to the experiences and needs in the US Payments System. Mr. Rick Youngblood of Bank ofAmerica (Charlotte) initially led the X9B11 Work Group for this revision. Rick also headed the Mid-Atlantic CheckFraud Task Force and ensured that the Wo
6、rk Group members had timely information to consider. As work continued,Ms. Helene Kontonis of the Chase Manhattan Bank succeeded Mr. Youngblood as X9B11 Work Group Chair.Helene, with the help of the Work Group members, has accomplished the necessary revisions and additions to thisvaluable publicatio
7、n. Final revisions for publication were completed by Mr. Curt Siroky, X9B Vice Chairman, John HHarland Company. At the time of its approval, the X9 Committee had the following members:Harold G. Deal, X9 Chairman, BB this starts the life cycle.2. The checks are either delivered to the CUSTOMER BANK (
8、for bank testing and delivery to the customer) ordirectly to a CUSTOMER for their future use.3. The CUSTOMER then uses the checks according to his/her needs and provides them to certain parties(PAYEES) for payments.4. The PAYEE then DEPOSITS the check(s) at a BANK or endorses the check(s) over to an
9、other party (eithersome company taking responsibility for processing for payment, or some party accepting the check as apayment), i.e., the SECOND ENDORSER.5. The DEPOSITS are received from the CUSTOMER by a TELLER, through the MAIL, NIGHT DEPOSITORYor ATM.6. The checks, having been received by a du
10、ly authorized area of the BANK, are transported to a check-processing site. ENCODING if junked, the castings should be brokenX9/TG-8-2002, CHECK SECURITY GUIDELINE6up prior to disposal. In all cases the serial numbers and records of disposal should be retained for a period of no lessthan ten years.
11、Paper supplies utilized by check manufacturers must be kept in secured areas. Employees should notbe allowed to have free access to areas where the actual check printing is taking place. Check manufacturersmust ensure that sales and manufacturing personnel have no previous criminal records that invo
12、lve crimes relative tocounterfeiting or forgery. When a crime is committed which involves a document produced by a check vendor, fullcooperation with the appropriate law enforcement agency should be provided. Company records should be madeavailable for review as long as employee civil rights are not
13、 violated.3.1.2 ADMINISTRATIONAll orders should be assigned a unique identity, and tracked throughout the check manufacturing process so that itsstate of completion and location in the production stream can be readily determined. Order monitoring shouldcontinue until proof of shipment is achieved. A
14、ppropriate controls should be in place to ensure that completedcheck orders cannot be inadvertently or purposely shipped to an incorrect destination. Due to the nature of theseproducts, check vendors should be discreet and treat each order as a confidential document. All checkmanufacturing staff mem
15、bers should remember that the inclusion of certain design and security features in checkorders could also be confidential. Documents should never be used as samples by vendors. Samples should nevercontain customer information of any sort, especially customer names or account numbers.3.1.3 SALES PRAC
16、TICESAppropriate safeguards should be in place to ensure that all check orders accepted for production are legitimate.Checks should not be printed if drawn on a bank which does not exist, or an account that has been closed, or isotherwise restricted. Verification is also required for changes in ship
17、ping destination, changes in printinginstructions for names or titles, unusual quantities, or out-of-sequence consecutive number ranges. Product samplesused for advertising or new customer education may be printed on real check stock, but should never carry a realcustomer name or financial instituti
18、on identity. Sample MICR code-lines should not illustrate a real routing number oraccount number. Additionally, the document should be overprinted with a clear and obvious message that the checkis a sample and it is not negotiable.3.1.4 SUPPLIESAll blank check stock and specialty papers should be ke
19、pt in a secure storage area. Where practical, inventories ofblank check stock should be packaged in pre-counted quantities and in tamper-evident units such as plastic shrink-wrap. Quantities of all sensitive materials should be verified on delivery, and all scrap, quality rejects and obsoleteitems s
20、hould be shredded prior to disposal. On-hand inventory should be audited frequently to identify shortages.Printing supplies, such as paper, ink, and printing plates must be kept in secure storage areas. Unprinted reams androlls of paper, as well as pre-printed standard stock check bodies (awaiting p
21、ersonal imprinting) should beinventoried on a regular basis. All spoiled documents should be shredded or incinerated. All unprinted securitypaper waste should be shredded prior to recycling. Plates used to print documents should be stored in secure areasor rendered useless prior to scrapping.3.1.5 P
22、RINTINGPress operators should be carefully monitored and appropriate precautions should be taken to prevent the printing of“orders“ or “double orders“. All output, which fails to pass quality inspection, should be promptly shredded fordisposal. Used printing plates should be regularly collected, acc
23、ounted for, and disposed of properly.X9/TG-8-2002, CHECK SECURITY GUIDELINE73.1.6 FACILITIESIt is important that access to check printing facilities be strictly controlled. Employees should not be allowed to takesecurity paper from the building unless cleared by a security officer. All security door
24、s should have alarms that atleast indicate whether they are opened. Visitors should not be allowed unless properly screened by authorizedmanagers. These visits should be cleared by security and employees should be made aware of the visit. Properescorts must be provided, allowing no free access to an
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIASCX9X9TG82002CHECKSECURITYGUIDELINEPDF

链接地址:http://www.mydoc123.com/p-431313.html