The Voucher System is designed for optimal security. Vouchers are assigned a random 16-digit number which makes a guess statistically near impossible. Above that, all unsuccessful (potentially fraudulent) voucher redemption attempts are detected and logged.
Like all security systems, the human factor is the most critical. Remember that vouchers represent cash, so take special care to protect the vouchers from unauthorized use.
Delete the generated PDF voucher document after the vouchers are printed. You can always regenerate the PDF document when needed.
Keep printed vouchers in a secure location.
Put vouchers in envelopes to prevent exposure of voucher numbers.
Check the Application Log regularly for unsuccessful (potentially fraudulent) voucher redemption attempts.
Use the Voucher List to monitor successful voucher redemption.
Delete or Expire a voucher batch immediately when vouchers are reported lost or stolen. See Section 4.14.1, “Voucher Actions”.
Voucher numbers are not encrypted in the database, so be careful to store database backup files at a save location.