ImageVerifierCode 换一换
格式:PDF , 页数:69 ,大小:264.99KB ,
资源ID:431313      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-431313.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ANSI ASC X9 X9 TG-8-2002 Check Security Guideline.pdf)为本站会员(fuellot230)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ANSI ASC X9 X9 TG-8-2002 Check Security Guideline.pdf

1、American NationalStandardfor Financial ServicesX9/TG-8-2002CHECK SECURITYGUIDELINESecretariat:American Bankers AssociationApproved September, 2001by X9 CommitteeX9/TG-8-2002, CHECK SECURITY GUIDELINEiFOREWORDThis technical guideline is a product of the Accredited Standards Committee X9 Financial Ser

2、vices, and wasgenerated by the ASC X9B Checks Subcommittee. It is the result of a cooperative effort of Bankers, Check Printers,Equipment Manufacturers, and Paper Suppliers; and as such, is the first compilation of techniques for the reductionof check fraud encompassing the entire “life cycle of the

3、 check.“ The guidelines referred to in this publication arecompatible with existing check standards and practices. Recommendations are based upon current and forecastedaspects of both technological and banking practices.These guidelines, while extensive in scope, do not cover all possible techniques

4、 or preventative measures. Whilethere are no guarantees that these techniques or measures will prevent fraudulent uses of checks, they do providethe reader with the basics necessary to ascertain their vulnerability to check fraud.The revision of the X9/TG-8 Check Security Technical Guideline has bee

5、n undertaken to ensure that TG-8 remainscurrent, in response to the experiences and needs in the US Payments System. Mr. Rick Youngblood of Bank ofAmerica (Charlotte) initially led the X9B11 Work Group for this revision. Rick also headed the Mid-Atlantic CheckFraud Task Force and ensured that the Wo

6、rk Group members had timely information to consider. As work continued,Ms. Helene Kontonis of the Chase Manhattan Bank succeeded Mr. Youngblood as X9B11 Work Group Chair.Helene, with the help of the Work Group members, has accomplished the necessary revisions and additions to thisvaluable publicatio

7、n. Final revisions for publication were completed by Mr. Curt Siroky, X9B Vice Chairman, John HHarland Company. At the time of its approval, the X9 Committee had the following members:Harold G. Deal, X9 Chairman, BB this starts the life cycle.2. The checks are either delivered to the CUSTOMER BANK (

8、for bank testing and delivery to the customer) ordirectly to a CUSTOMER for their future use.3. The CUSTOMER then uses the checks according to his/her needs and provides them to certain parties(PAYEES) for payments.4. The PAYEE then DEPOSITS the check(s) at a BANK or endorses the check(s) over to an

9、other party (eithersome company taking responsibility for processing for payment, or some party accepting the check as apayment), i.e., the SECOND ENDORSER.5. The DEPOSITS are received from the CUSTOMER by a TELLER, through the MAIL, NIGHT DEPOSITORYor ATM.6. The checks, having been received by a du

10、ly authorized area of the BANK, are transported to a check-processing site. ENCODING if junked, the castings should be brokenX9/TG-8-2002, CHECK SECURITY GUIDELINE6up prior to disposal. In all cases the serial numbers and records of disposal should be retained for a period of no lessthan ten years.

11、Paper supplies utilized by check manufacturers must be kept in secured areas. Employees should notbe allowed to have free access to areas where the actual check printing is taking place. Check manufacturersmust ensure that sales and manufacturing personnel have no previous criminal records that invo

12、lve crimes relative tocounterfeiting or forgery. When a crime is committed which involves a document produced by a check vendor, fullcooperation with the appropriate law enforcement agency should be provided. Company records should be madeavailable for review as long as employee civil rights are not

13、 violated.3.1.2 ADMINISTRATIONAll orders should be assigned a unique identity, and tracked throughout the check manufacturing process so that itsstate of completion and location in the production stream can be readily determined. Order monitoring shouldcontinue until proof of shipment is achieved. A

14、ppropriate controls should be in place to ensure that completedcheck orders cannot be inadvertently or purposely shipped to an incorrect destination. Due to the nature of theseproducts, check vendors should be discreet and treat each order as a confidential document. All checkmanufacturing staff mem

15、bers should remember that the inclusion of certain design and security features in checkorders could also be confidential. Documents should never be used as samples by vendors. Samples should nevercontain customer information of any sort, especially customer names or account numbers.3.1.3 SALES PRAC

16、TICESAppropriate safeguards should be in place to ensure that all check orders accepted for production are legitimate.Checks should not be printed if drawn on a bank which does not exist, or an account that has been closed, or isotherwise restricted. Verification is also required for changes in ship

17、ping destination, changes in printinginstructions for names or titles, unusual quantities, or out-of-sequence consecutive number ranges. Product samplesused for advertising or new customer education may be printed on real check stock, but should never carry a realcustomer name or financial instituti

18、on identity. Sample MICR code-lines should not illustrate a real routing number oraccount number. Additionally, the document should be overprinted with a clear and obvious message that the checkis a sample and it is not negotiable.3.1.4 SUPPLIESAll blank check stock and specialty papers should be ke

19、pt in a secure storage area. Where practical, inventories ofblank check stock should be packaged in pre-counted quantities and in tamper-evident units such as plastic shrink-wrap. Quantities of all sensitive materials should be verified on delivery, and all scrap, quality rejects and obsoleteitems s

20、hould be shredded prior to disposal. On-hand inventory should be audited frequently to identify shortages.Printing supplies, such as paper, ink, and printing plates must be kept in secure storage areas. Unprinted reams androlls of paper, as well as pre-printed standard stock check bodies (awaiting p

21、ersonal imprinting) should beinventoried on a regular basis. All spoiled documents should be shredded or incinerated. All unprinted securitypaper waste should be shredded prior to recycling. Plates used to print documents should be stored in secure areasor rendered useless prior to scrapping.3.1.5 P

22、RINTINGPress operators should be carefully monitored and appropriate precautions should be taken to prevent the printing of“orders“ or “double orders“. All output, which fails to pass quality inspection, should be promptly shredded fordisposal. Used printing plates should be regularly collected, acc

23、ounted for, and disposed of properly.X9/TG-8-2002, CHECK SECURITY GUIDELINE73.1.6 FACILITIESIt is important that access to check printing facilities be strictly controlled. Employees should not be allowed to takesecurity paper from the building unless cleared by a security officer. All security door

24、s should have alarms that atleast indicate whether they are opened. Visitors should not be allowed unless properly screened by authorizedmanagers. These visits should be cleared by security and employees should be made aware of the visit. Properescorts must be provided, allowing no free access to an

25、y visitor.3.1.7 EMPLOYEESEmployees should be made aware that they are depended upon to protect company integrity and customerinformation. Additionally, a full and complete background check of all prospective employees should proceed hiring.Credit history, criminal record, prior employment history an

26、d personal references should be carefully examined (so faras it is consistent with individual rights). When appropriate, employment should be denied to those whose personalhistory offers evidence of unacceptable risk.3.2 CHECK STOCK RETAILERSDesktop software technologies have made it possible for en

27、d users and businesses to completely print theirown checks using pre-decorated blank check stock. The printing of checks by end users and businessesrequires the use of magnetic ink or special toner cartridges for producing MICR characters. This ensures thatthese checks process properly in the reader

28、/sorter machines used for processing checks in the US PaymentsSystem. Due diligence requires that the wise end user should purchase and use a secure paper stock thatpermits the checks he or she produces to be resistant to alteration and copying. The blank paper stock usedfor the printing of these ch

29、ecks can be obtained from a variety of sources, including suppliers offering checkstock via the World Wide Web. Many retail office supply stores also offer this stock for sale both with andwithout the software used for printing the check. Because this blank paper stock could potentially be used ina

30、fraudulent manner, it is important that resellers that offer these products for sale understand theramifications of these actions. It is in the best interest of local store retailers to control or limit the sale ofblank check stock because these same retailers are often times the victim of fraudulen

31、t checks producedwith the very product that they sell. There is growing evidence that many fraudulent checks presented toretailers are generated on easy to obtained check stock.The following sub-clause outlines a number of precautions that retailers must take to safeguard access to this stock.3.2.1

32、ACCESSIt is strongly recommend that once a retailer has made the decision to sell blank check stock, that increased securityof the stock and anonymousness of the purchaser be minimized. Blank check stock should be available from a lockedsales counter like other high dollar value products. Only autho

33、rized store employees should have access to thelocked stock. This will safeguard the stock and require a face-to-face transaction for a customer to initiate andcomplete a purchase. It would also be advised that these authorized store employees be clear of any criminal recordsthat involve check fraud

34、. All employees should be trained to look for suspicious behavior from potential purchasersof blank check stock.X9/TG-8-2002, CHECK SECURITY GUIDELINE84. CHECKS, DRAFTS AND MONEY ORDERSThis document principally addresses personal and commercial checks. However, the following ten clauses identifyothe

35、r paper payment instruments in common use. Whether you are the payor, the payee, or represent the payorfinancial institution (or some other interested third party), you should understand the payment instrument beingused.4.1 BANK DRAFTSBank drafts are payment instruments written by a financial instit

36、ution against its funds on deposit with anotherfinancial institution, e.g. tellers checks, domestic and foreign.4.2 CASHIERS CHECKS AND OFFICIAL CHECKSCashiers checks and bank official checks are direct obligations of the financial institution or bank holding company,drawn on the financial instituti

37、on or bank holding company, and signed by an authorized employee on behalf of thefinancial institution or bank holding company. These instruments are used by the financial institution or bankholding company to settle its own obligations as well as used by bank customers who purchase them to settlepe

38、rsonal obligations. Cashiers checks and bank official checks represent the obligation of the financial institution orbank holding company, as opposed to the obligation of an account holder because they are issued by a financialinstitution, which guarantees that the funds are available.Cashiers check

39、s have several advantages over other kinds of checks and guarantee the check was fully completedprior to issue. Like all paper payment instruments, cashiers checks may be altered, stolen or counterfeited. If acashiers check is lost or stolen, the customer cannot demand reimbursement within 90 days o

40、f issue, under UCC 3-312 (1990 revision). Lost or stolen certified checks have the same replacement problems.4.3 CERTIFIED CHECKSCertified checks are personal or business checks that have been presented to the issuing financial institution by theaccount holder or a third party for guarantee that the

41、 check will be paid on presentment. As proof of certification, anauthorized party at the payor financial institution places a written, signed statement on the check (usually on its face)which guarantees payment. Typically, at the time of certification, the depositors account is debited for the amoun

42、t ofthe check and the funds are set aside in a dedicated account at the payor financial institution. These funds are paidupon presentment. The process of certification shifts liability for payment of the item from the maker of the check tothe payor financial institution. In this sense, a certified c

43、heck functions identically to a cashiers check or tellerscheck.The process of certification guarantees only that the account is valid and that, at the time of certification, sufficientfunds were present to cover the amount printed on the check as certified. It does not necessarily guarantee thevalid

44、ity of the signature or the completion of the instrument, unless required by the certifying financial institution.Payor financial institutions have no obligation to certify checks drawn on their customers accounts.Certification procedures and markings vary from one financial institution to another a

45、nd the appearance of certifiedchecks varies widely, since they may also be ordinary business or personal checks. Therefore, it may be difficult totell if a check has been fraudulently certified. Despite general perceptions, protection is only provided to the accountholder and to the payor financial

46、institution if it validates all certified checks before payment. If a certified check islost or stolen, the customer cannot demand reimbursement within 90 days of issue, under UCC 3-312 (1990 revision).Lost or stolen cashiers checks have the same replacement problems.X9/TG-8-2002, CHECK SECURITY GUI

47、DELINE94.4 DEMAND DRAFTSDemand drafts are written orders to pay the amount of the draft on sight, i.e., the presentment of a sight draft. A“check“ is a demand draft drawn on a bank or other financial institution.4.5 MONEY ORDERSMoney orders are issued by a Post Office, financial institution, or comp

48、any, for payment of a specific sum of money.Two types of money orders exist. The first type is a product marketed by firms under strict security procedures of afranchise agreement with various outlets. The second type of money order is sold by individual institutions as aconvenience to their custome

49、rs. Many money orders are like personal checks and are not obligations of the sellinginstitution, but are drawn on them. Both types are traditionally imprinted by check writing equipment that producesamounts that cannot be easily altered. A major difference between a money order issued by a financial institution,and one issued by a Post Office, is that the bank money order can be endorsed any number of times. A Postal moneyorder can only be endorsed once.4.6 PAYABLE-THROUGH-DRAFTSPayable-through-drafts are checks written on a financial institution, or other payor, but payable thro

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1