LOST, STOLEN OR SKIMMED
|
|
|
- Howard Houston
- 10 years ago
- Views:
Transcription
1 LOST, STOLEN OR SKIMMED Overcoming credit card fraud in South Africa Trevor Budhram* A credit card is a convenient method of payment, but it does carry risks. The enormous growth in the use of credit cards has resulted in high levels of credit card fraud. Technological advances have allowed the perpetrators to produce counterfeit cards that resemble the genuine card so closely that it is difficult for shopkeepers, tellers, police and bank investigators to identify a fraudulent card. Identity theft and the exponential growth of the internet have further compounded the crime of credit card fraud by allowing for on-line purchasing, resulting in huge financial losses to the card industry and consumers alike. This article discusses credit card fraud in South Africa and offers information about the measures taken to reduce it. The use of credit cards has become a way of life in many parts of the world. Today, credit cards are used like cash. All credit cards have one thing in common, namely that the bearer can obtain something of value simply by presenting the card. However, credit card fraud results in high losses both for the banking industry and consumers, and seems to be increasing. According to the South African Banking Risk Intelligence Centre (SABRIC), financial losses resulting from credit card fraud increased by 53% between 2010 and Total losses to the sector amounted to R403,15 million, an increase from 2010 of R263,8 million. 2 The high rate of card fraud perpetrated should thus be a major concern for establishments accepting credit cards, the banking industry, and especially for individual users. * Trevor Budhram is a senior lecturer in the Department of Police Practice, University of South Africa. This article is based on a review of the national and international literature on credit card fraud and the security features found on cards, undertaken for the author's master's dissertation titled 'Examining the Unique Security Features of a Credit Card with the Aim of Identifying Possible Fraudulent Use', AN OVERVIEW Credit card fraud takes many forms, from thieves using stolen credit cards to buy goods, to the greater, more sophisticated problem of criminals altering security features. 3 According to Snyman, fraud is defined as the unlawful and intentional making of a misrepresentation which causes actual prejudice or which is potentially prejudicial to another. 4 Despite a host of hi-tech anti-fraud measures, the battle against fraud continues as criminals continue to poke and prod at the card industry s weak spots. 5 In the early days of the card industry, card fraud was a crime of opportunity, originating from a sales slip found in a dustbin or a card found in a lost or stolen wallet. An example from case law can be found in S v Salcedo (2003) 6 where the accused committed credit card fraud by picking up a credit card that had fallen out of the account holder s pocket in a mall and going on a spending spree the same day. The accused was convicted on nine counts of fraud and sentenced to six months imprisonment on each count. 7 Since then the crime of credit card fraud has evolved into a highly organised business that reaches around the world. June
2 When a person receives a credit card from the bank s/he enters into a legal relationship with the bank. Van der Bijl states that the legal relationship between the parties to the credit card agreement is regulated by the contract itself, the general principles of contract law and the National Credit Act 34 of The Act provides that the cardholder bears all the risks for unauthorised transactions until the issuer is informed, whereafter the issuer will bear the loss. With regards to the unauthorised use of the original credit card and alleged unfair contractual terms 9 in a leading case of Diners Club SA (Pty) Ltd v Singh and another, 10 the account holder was found guilty for authorising certain transactions that occurred with his card in London. The case discussed numerous issues surrounding the encryption of the pin and the possibility of the card being cloned. The court ruled that an original card and pin were used to perpetrate the fraud and not a duplicate card. The court was however critical of the risk specific to the contract, in that it was one-sided and favoured the issuer, so that the risk of wrongful use is placed on the customer. 11 Different types of credit card fraud exist, ranging from counterfeit card fraud to lost and stolen card fraud. Lost and stolen card fraud is opportunistic and can be controlled by precautionary measures being adopted by cardholders, whilst counterfeit card fraud involves a number of technological fraud types such as cloned cards, altering of information on the magnetic stripe and the re-embossing of details onto cards. 12 Credit card fraud does not exist in a vacuum. Often credit card fraud is linked with other crimes, such as burglary, mail theft and organised crime. 13 TYPES OF CREDIT CARD FRAUD Fraud with stolen and lost credit cards Fraud with stolen and lost credit cards is the most common type of credit card fraud and involves the theft of genuine card details that are used to make a purchase through a remote channel such as the phone, fax, mail order or the Internet, 14 and/or by presenting the card at a till point. Combined, these two categories constituted the highest percentage card fraud incidents in South Africa in 2007/2008 (68%). It further constituted the highest card fraud losses in South Africa on RSA issued cards year on year between 2005 and 2008 (57,1m in 2005/2006, R122,9m in 2006/2007, R150m in 2007/2008 and R33,1m in 2008/2009). 15 However, according to SABRIC, the use of this fraud type decreased by 60% in This was attributed to the roll out of the chip-and-pin card, which requires a person to enter a pin code when transacting with the card. The South African Police Service (SAPS) Annual Report 17 for the period 2010/2011 shows that a total of 339 cases were recorded in this category with an actual loss of R (a substantial decrease since 2007/8). As with counterfeit card fraud, the legitimate card holder may not be aware of this fraud until they check their bank statements. To counter this, banks, for example First National Bank, have started to send out sms alerts to account holders mobile phones and addresses whenever a transaction is made. Counterfeit card fraud Counterfeit card fraud involves a card that has been illegally manufactured from information stolen from a magnetic strip of a genuinely issued card. 18 In other cases, lost and stolen cards and old cards are encoded with information stolen from a genuine card for the purposes of committing counterfeit card fraud. The information needed for counterfeit card fraud is usually stolen through skimming a genuine card. Van der Bijl states that skimming entails that the magnetic strip on the back of the card is copied using a hand held card reader. 19 Skimming can also be perpetrated by concealing a skimming device in the card slot of an ATM which results in the recording of data of all cards accessing the specific ATM as well as recording the secret pin code of the card. 20 According to the SAPS training manual on credit card fraud, skimming normally occurs at retail outlets, particularly at 32 Institute for Security Studies
3 bars, restaurants and petrol stations where a corrupt employee skims a customer s card before handing it back. 21 The year on year percentage growth of counterfeit card fraud has remained fairly constant since 2005/2006 (at an average annual growth rate of between 15% and 21%). 22 This is an indication that counter measures, such as card awareness campaigns, merchant training and joint operations between SAPS and the card industry have not been successful. In addition the problem points to the security weakness of magnetic stripe, as the data they store can be copied. According to SABRIC, losses through this type of fraud for the year October 2009 to September 2010 amounted to R141,4 million 23 and statistics for the period September 2010 to October 2011 show losses amounting to a staggering R176 million and accounts for 57,2% of overall losses to the banking sector. 24 The SAPS Annual Report 2010/2011 records a total of cases received for this category of fraud, for which 308 suspects were arrested, resulting in an actual loss of R The discrepancy between the SAPS and SABRIC figures in the opinion of the author may be a consequence of the fact, that only cases in which suspects are identified (308 in this case) are reported to the SAPS. In addition, cardholders who are victims report their cases to the banks and hold the bank accountable for the fraud. The banks reimburse the clients and do not pursue the case nor report it to the SAPS. Card not present fraud Card not present fraud denotes a fraudulent transaction that occurs when the card, the card holder or the merchant representative is not present at the time of the transaction which is made online or via the telephone. 26 This means that: The merchants are unable to check the physical security features of the card to determine if it s genuine Without a signature or a pin it is not easy to confirm that the customer is the genuine card holder Card issuers cannot guarantee that the information provided in a card not present environment relates to the genuine card holder. This fraud type has increased at the rate of approximately 50% year on year since 2005/6; from R6,5m in 2005/06, to R12,8m in 2006/07, to R21,3m in 2007/08, to R30,9m in 2008/09 and amounting to R80,9m in 2009/ According to SABRIC this fraud type increased by 77% in 2011 and is the second most prevalent form of [credit card] fraud. 28 Losses amounted to R142,8 million in The ease and frequency with which on-line and telephonic purchases can be made contribute to the increase in the prevalence of this form of fraud. Internet and telephonic transactions provide anonymity, making it possible for the fraud to be perpetrated without fear of arrest. Online purchases may be done at internet cafes, and telephonic purchases at public phone booths, making it difficult to trace perpetrators. The year-on-year growth in the extent of financial losses suffered by the banking industry indicates that no counter measures have been effective in reducing this kind of card fraud. MEASURES TO SECURE CREDIT CARDS Over the past 25 years there has been a constant race between the credit card industry developing new security features to deter counterfeiting, and criminals working hard to compromise the technology and manufacture counterfeit cards. The discussion that follows shows two types of VISA credit cards, indicating the different security features and where they are located. The security features endorsed on the cards have been in effect worldwide since May The Visa Mini Dove Hologram and Visa Dove Hologram are among the most prominent features on the front of a credit card. Rapp explains that holograms are small metallic oblongs, containing a laser-etched image on their surface. 32 The image changes shape and colour depending on the June
4 Figure 1 Security features Visa mini dove design hologram on back of card The signature panel has an updated tamper evident design, as shown here, or has a custom design. It may vary in length dependent on card type. If someone has tried to erase the signature panel, the word VOID will be displayed. The mini dove design hologram may appear on the back to the right or left of the signature panel, or below it. A three-dimensional dove hologram should reflect light and seem to change as you tilt the card. Most counterfeit cards contain a one-dimensional printed image on a foil sticker. A Four-digit number must be printed directly below the account number. This four-digit number must match exactly with the four digits of the account number. Both must begin with a 4. Good thru (or valid thru ) date is the expiration date of the card. It is located below the embossed account number. If the current transaction date is after the good thru date, the card has expired. Source: Visa Logo Card Security Features 2007 Ultraviolet V is visible over the Visa brand mark when placed under an ultraviolet light. The magnetic stripe is encoded with the card s account number, expiration date, and other identifying information. It should be smooth and straight, with no signs of tampering. The Card Verification Value (CVV2) is a threedigit code that appears either on the signature panel or on a white box to the right of the signature panel. Portions of the account number may also be present on the signature panel. CVV2 is used primarily in card-not-present transactions to verify that the customer is in possession of a valid Visa card at the time of the sale. Embossed or printed account number on valid cards begins with 4. The account number must be even and straight; on altered cards, they may have fuzzy edges, or you may be able to see ghost images of the original numbers. Visa brand mark appears in blue and gold on a white background. It must appear in either the bottom right, top left or top right corner. viewing angle, and is very difficult to forge. The Visa mini dove hologram appears on the back of the card (see Figure 1) whilst the Visa dove hologram appears on the front of the card (see Figure 2). The design is three dimensional. The last four digits of the embossed account number are incorporated in the hologram. 33 Very few counterfeit holograms have actually been used. 34 In most cases of counterfeit cards, the hologram is not a hologram but a look-a-like item that is reflective rather than refractive. Holograms are refractive, that is, the item in the hologram appears to actually move, whereas a reflective item is only a photo on a reflective material. Forged holograms have included printed images, using a variety of materials and inks. Some have used plain foils and/or diffraction grating foils. 35 Fraudulent holograms comprise flat images of a dove which includes no movement or colour change. This is one way in which vendors can determine whether a card presented for payment is a genuine card or one that has been forged. Of equal prominence is the embossed or printed account number. Embossing is the oldest security or identification technique for marking payment or ID cards in machine readable form. 36 The account number must appear clear, clean, and uniform in size and spacing. The four digit number printed below the embossed account number must match the first four digits of the account number. (See Figure 1). A feature that cannot be viewed with the naked eye is the ultra violet feature. This is found on the Visa logo and on the signature panel. (See Figures 1 and 2.) Criminals do not interfere with this security feature because they are unaware of its existence. 37 Rapp states that some cheques and credit cards have images or symbols printed in ultraviolet ink. 38 These are invisible to the naked eye in normal light, but show up very clearly under ultraviolet light. The Ultra Violet V, found in the VISA brand mark, is such an example. The Ultra Violet V is visible over the Visa Brand Mark when placed under an ultra violet light Institute for Security Studies
5 Another highly visible feature is the pre-printed bin situated below the first four digits of the embossed account number, which shows the issuing bank s identification number. 40 In Figure 1 it is referred to as Four-Digit number and in Figure 2 printed first 4 digits of account number. This is a four digit printed number that matches the first four digits of the embossed account number. If the two numbers do not match, the card has been altered or is a counterfeit. Affixed to the back of the card is a stripe of magnetic tape, which contains essential cardholder and account information. The magnetic stripe can store about 130 characters or numbers. 42 It allows a transaction to be processed when it is read at an electronic point of sale at a merchant by swiping it across a reading head, either manually or automatically. 43 The information includes the account number and expiry date, which must correspond with those embossed on the face of the card. 44 Although it is technically possible to remove a magnetic stripe from a card and replace it with another, or rerecord over it, in practice it is uneconomical. Below the magnetic stripe is the signature panel, which contains an ultra violet element that repeats the word VISA. 45 Chemical eradicators have allowed some card criminals to remove the legitimate signature from a stolen or lost card and substitute their own. This made it necessary to over print a signature strip with a light coloured pattern using a special ink that would change colour when it came in contact with ink eradicator. 46 The ink will also rub off if any attempts are made to remove the signature with a rubber eraser. If an attempt is made to erase the signature panel the word VOID will be displayed. The three digit Card Verification Value 2 (CVV2) are reverse-italic, indented printed numbers which must appear in a white box to the right of the signature panel or on the signature panel. Part of this number is an algorithmically calculation which the issuer can verify as genuine. 47 The value can be checked when a merchant is required to refer to the issuer of an account for authorisation of a transaction where an electronic approval is not available or permissible. 48 See Figure 1. Figure 2 Magnetic stripe Signature panel design can be customised Chip (optional) Embossed or printed account number Printed first four digits of account number Expiration date Cardholder name or identifier Source: Visa Merchant Quick Guide June
6 The high rate of credit card fraud has prompted the various card associations to develop new technology in an attempt to try and curb the counterfeiting of credit cards. Magnetic stripe technology has proven to be vulnerable and now, after more than 30 years of providing security the magnetic stripe is to be replaced with new technology, namely the microchip. 49 Cards now have an embedded integrated circuit or microchip, which is found on the left side of the card above the embossed or printed account number (see figure 2). The card has electronic logic to store data, and in some cases, a microprocessor that can process data. Also known as a smart card or relationship card, it can be contact (activated when terminals touch a smart card reader) or contactless (activated by radio waves when passed near a transmitter). The type of chip cards currently used range from fairly simple memory devices to sophisticated microprocessors. The latest generation of chip cards contain a microprocessor, a liquid crystal display and a power source, which enable the card to be used independently of a card reader. 50 PREVENTATIVE COUNTER- MEASURES The vulnerability of the magnetic strip to skimming has resulted in banks replacing this technology with chip-and-pin technology. The chip-and-pin technology has so far proved successful in countries such as the United Kingdom, where total counterfeit card fraud decreased by 32% in the past two years. 51 In South Africa not all cards will have the chip-and-pin feature because not all merchants have the systems installed to support chip-and-pin cards. This means that magnetic stripe technology will remain in use for some years to come. Banks in South Africa have, however, deployed sophisticated IT programmes that help to detect, prevent and reduce bank card fraud. Examples include SMS confirmation of transactions, the implementation of authorisation parameters and thresholds, and forensic investigations. These measures are, however, reactive and banks should consider an intelligence-led approach to combating card fraud. However, in order for this approach to be successful it requires co-operation between SAPS and the banks. This approach requires a combined use of crime analysis and criminal intelligence in order to determine crime reduction tactics. The launch of the on-line verification system, a joint initiative between the Department of Home Affairs and SABRIC, on 8 November 2011 allows banks access to the Home Affairs National Identification System to verify the identity of prospective and current clients, using their fingerprints. This tool provides an added benefit to the bank client in that it offers the banks a second layer of confirmation that the persons presenting identity documents are indeed who they purport to be. 52 CONCLUSION Credit card fraud has been committed since credit cards were first introduced; however, modern technology has increased the ways in which it can be committed. Criminals see the card industry as a lucrative business that can be exploited by the use of technology. To counter the problem, credit card companies constantly review security features and measures that are applied to cards and devote considerable resources to the maintenance of security systems and programming. There are numerous challenges to dealing with credit card fraud, particularly since transactions do not require the physical presence of seller and purchaser. The establishment of a dedicated joint working group consisting of members from the Commercial Crimes branch in the SAPS, the Asset Forfeiture Unit, and banks, in addressing card fraud, may provide the tonic in addressing card fraud in that it brings about the joining of divergent skills, expertise and resources. The low conviction rates for counterfeit card fraud for the period 2010/2011 indicate the difficulties the police face in investigating crimes of this nature. In 2010/11, cases of credit card fraud (counterfeit, stolen and fraud with other cards) were reported to the police for investigation. A total of 229 cases went through the court process 36 Institute for Security Studies
7 and a total of 223 accused persons were convicted. 53 It is therefore important that a new approach, for example an intelligence led approach, be considered in combating card fraud. NOTES To comment on this article visit 1. Credit card fraudsters hit it big, IT Web, available at (accessed 23 March 2012). 2. Ibid. 3. Visa International Law Enforcement Education Programme, Credit Cards, CEMEA Region, 2002, Carel Rainier Snyman, Criminal Law, (Third Edition), Durban: Butterworths, 1995, Snyman, Criminal Law, S v SALCEDO 2003 (1) SACR 324 (SCA). 7. S v SALCEDO 2003, Charnelle van der Bijl, The cloning of credit cards: The dolly of the electronic era, Stellenbosch Law Review, 18, 2 (2007), Van der Bijl, The Cloning of Credit Cards, Diners Club SA (Pty) Ltd v Singh and another 2004 (3) SA 630 (D). 11. Van der Bijl, The cloning of credit cards, Van der Bijl, The cloning of credit cards, Burt Rapp, Credit card fraud, Port Townsend, Washington: Loompanics Unlimited, 1991, Rapp, Credit Card Fraud, SABRIC: Credit Card Fraud South Africa, 2008, Credit card fraud drops, South Africa: The Good News, business/credit_card_fraud_drops_html (accessed 24 August 2011). 17. South African Police Service, Annual Report, 2010/ 2011, SAPS Annual Report, Van der Bijl, The cloning of credit cards, Credit card fraud, security_fraud.php (accessed 24 August 2011). 21. South African Police Service Advanced Training Manual, Commercial Crime, 2002, SABRIC: Credit Card Fraud South Africa, 2008, Credit card fraudsters hit it big, IT Web, available at (accessed 23 March 2012), Ibid. 25. SAPS Annual Report, 2010/11, SABRIC: Credit Card Fraud South Africa, 2008, SABRIC: Credit Card Fraud South Africa, 2008, 30. Credit card fraudsters hit it big, IT Web, available at (accessed 23 March 2012). 28. SAPS Advanced Training Manual, Credit card fraudsters hit it big, IT Web, available at (accessed 23 March 2012), Trevor Budhram, Examining the unique security features of a credit card with the aim of identifying possible fraudulent use, dissertation submitted for Masters degree, University of South Africa, 2007, Merchant quick reference guide. Visa card security features, May CEMEA Region. 32. Burt Rapp, Credit card fraud, Visa International Law Enforcement Education Programme, Credit Cards, CEMEA Region, 2000, Visa International Law Enforcement Education Programme, Credit Cards, CEMEA Region, 2000, Ibid. 36. Wilhelm Georg Schulze, Smart cards and e-money: new developments bring new problems, Mercantile Law (2004), Visa International Law Enforcement Education Programme, Credit Cards, CEMEA Region, 2000, Burt Rapp, Credit card fraud, Merchant quick reference guide. Visa card security features, May CEMEA Region. 40. Visa International Law Enforcement Education Programme, Credit Cards, CEMEA Region, 2000, Merchant quick reference guide. Visa card security features, May CEMEA Region. 42. Visa International Law Enforcement Education Programme, Credit Cards, CEMEA Region, 2000, Wilhelm George Schulze, E-money and electronic fund transfers: A short-list of some unresolved issues, Mercantile Law (2004), Visa International Law Enforcement Education Programme, Credit Cards, CEMEA Region, 2000, Trevor Budhram, Examining the unique features of a credit card with the aim of identifying possible fraudulent use, Burt Rapp, Credit card fraud, Visa International Law Enforcement Education Programme, Credit Cards, CEMEA Region, 2000, Ibid. 49. Wilhelm Georg Schulze, Smart cards and e-money, Wilhelm Georg Schulze, E Money and Electronic Fund Transfers, A Shortlist of Some of the Unresolved Issues, HEINONLINE: Mercantile Law. Journal, (2004), Wilhelm Georg Schulze, E-money and electronic fund transfers, 16. June
Merchant Services. How to help protect your business
Please immediately report any suspicious activity involving credit card or debit card use to TD Merchant Services at 1-800-6-116 For more information, visit www.tdmerchantservices.com Merchant Services
PROTECT YOUR BUSINESS FROM LOSSES WHILE ACCEPTING CREDIT CARDS
PROTECT YOUR BUSINESS FROM LOSSES WHILE ACCEPTING CREDIT CARDS TABLE OF CONTENTS Introduction...1 Preventing Fraud in a Card-Present Environment...2 How to Reduce Chargebacks in a Card-Present Environment...4
Maksekaartide vastuvõtmise nõuded. Requirements for accepting bankcards
Maksekaartide vastuvõtmise nõuded Requirements for accepting bankcards Contents General Requirements Using Cards in Payment Terminals Returning Purchases Identification of Persons Terminal Response Codes
CARDNET. Card payments made easy for you and your customers
CARDNET Card payments made easy for you and your customers Contents Welcome 1 1. Key points 3 2. Acceptable cards 5 Visa 7 Visa Credit 9 Visa Debit 9 V PAY 11 Visa Electron 13 Visa Prepay 15 Visa and Visa
Payment Cards. Acceptance requirements and security features
Payment Cards Acceptance requirements and security features Contents General Requirements...3 Using The Card In A Payment Terminal...3 Returning of the Purchase...4 Identification of a Person...5 The Terminal
How To Process Credit Card Receipts
Marketplace Agreement Through Student Organization Finance Center Merchant Account To be submitted with the Credit Card Security Agreement This request is valid for one (1) year. The Recognized Student
Plastic Fraud. Debit Cards Debit cards, unlike credit cards, automatically withdraw funds from your account at the time you make a transaction.
Getting a Handle on Debit and Credit Cards Plastic Fraud State-of-the-art thieves are concentrating on plastic cards. In the past, this type of fraud was not very common. Today, it is a big business for
Rules for Visa Merchants. Card Acceptance and Chargeback Management Guidelines
Rules for Visa Merchants Card Acceptance and Chargeback Management Guidelines Rules for Visa Merchants Card Acceptance and Chargeback Management Guidelines Table of Contents Introduction..............................................................
Guide to credit card security
Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely
Frequently asked questions - Visa paywave
Frequently asked questions - Visa paywave What is Visa paywave? Visa paywave is a new contactless method of payment - the latest evolution in Visa payments. It is a simple, secure and quick payment method
Avoiding Fraud. Learn to recognize the warning signs for fraud and follow these card acceptance guidelines to reduce your risk.
Avoiding Fraud Learn to recognize the warning signs for fraud and follow these card acceptance guidelines to reduce your risk. Intoduction Fraud comes in many forms and hurts merchants of all sizes. Whether
Visa Tips for Restaurant Staff
Visa Tips for Restaurant Staff Helpful Information and Best Practices for Handling Visa Transactions For U.S. Only When it comes to restaurants, most customers are looking for the same basic things...
The Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online.
1 February 2010 Volume 2, Issue 1 The Merchant Serving Florida State University s Payment Card Community Individual Highlights: Skimming Scam 1 Skimming at Work 2 Safe at Home 3 Read your Statement 4 Useful
Credit Card PIN & PAY Frequently Asked Questions (FAQ)
Credit Card PIN & PAY Frequently Asked Questions (FAQ) 1. What is a PIN & PAY card? PIN & PAY card is a PIN - enabled card that allows you to make purchase by keying in a 6-digit PIN, with no signature
Payment Card Security Elements and Card Acceptance. Instruction
Payment Card Security Elements and Card Acceptance Instruction Content Internetbank. General requirements.... Use of Card in payment terminal.... Transaction cancellation.... Personal identification....
Fraud Minimisation Guide ANZ Merchant Business Solutions
Fraud Minimisation Guide ANZ Merchant Business Solutions INTRODUCTION Fraud can occur in and is a risk for any business that accepts credit cards and it can have a significant financial impact on your
Be*PINWISE Cardholder FAQs
Be*PINWISE Cardholder FAQs 1. Who is behind the BuySafe initiative? The Industry Security Initiative (ISI)/BuySafe initiative comprises representatives of ten Australian financial institutions including
Version 15.3 (October 2009)
Copyright 2008-2010 Software Technology, Inc. 1621 Cushman Drive Lincoln, NE 68512 (402) 423-1440 www.tabs3.com Portions copyright Microsoft Corporation Tabs3, PracticeMaster, and the pinwheel symbol (
> Every Card. Every Time.
> Every Card. Every Time. Fraud Prevention Program Reference Guide Moneris SOLUTIONS Moneris Solutions Fraud Prevention Reference Guide > Every Card. Every Time. Table of Contents Suspicious customer behaviour
Card Acceptance and Chargeback Management Guidelines for Visa Merchants
Card Acceptance and Chargeback Management Guidelines for Visa Merchants Card Acceptance and Chargeback Management Guidelines for Visa Merchants Table of Contents Introduction... 1 Purpose and Audience...2
THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP
THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit
Eagle POS Procedure Guide For Epicor Bankcard Processing
Eagle POS Procedure Guide For Epicor Bankcard Processing Table of Contents Introduction... 3 1 Transactions using a Swiped Bankcard... 3 Basic Swiped Credit Card Sale & Return transaction... 3 Sales &
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved
Securing the Payments System. The facts about fraud prevention
Securing the Payments System The facts about fraud prevention Contents Introduction 3 Visa s Security Programme 4 Fraud Types and Threats 6 Fraud Statistics and Research 7 Visa s Security Agenda for New
Consumer FAQs. 1. Who is behind the BuySafe initiative? 2. Why should I use a PIN? 3. Do all transactions need a PIN?
Consumer FAQs 1. Who is behind the BuySafe initiative? The Industry Security Initiative (ISI)/BuySafe initiative comprises representatives of ten Australian financial institutions including all of the
EMV EMV TABLE OF CONTENTS
2 TABLE OF CONTENTS Intro... 2 Are You Ready?... 3 What Is?... 4 Why?... 5 What Does Mean To Your Business?... 6 Checklist... 8 3 U.S. Merchants 60% are expected to convert to -enabled devices by 2015.
American Express Fraud Prevention Handbook
American Express Fraud Prevention Handbook FP-HAND2000 Cards To heighten your awareness to the problem of fraudulent transactions, American Express produced this handbook as part of our efforts to help
MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008
MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008 Current Laws: A person shall not obtain or attempt to obtain
Figure 1: Attacker home-made terminal can read some data from your payment card in your pocket
A Touchy Subject There are increasingly frequent claims that contactless smart payment cards are insecure because they can be read while in your wallet or pocket. Can this really be true? And if so, is
Credit Cards CARD TRANSACTIONS AND YOU. Credit Cards. A consumer education programme by:
Credit Cards CARD TRANSACTIONS AND YOU Credit Cards A consumer education programme by: CONTENTS 1 Introduction 2 What is a credit card and how it works Applying for a credit card 3 Application process
What Merchants Need to Know About EMV
Effective November 1, 2014 1. What is EMV? EMV is the global standard for card present payment processing technology and it s coming to the U.S. EMV uses an embedded chip in the card that holds all the
AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA
Australian Payments Clearing Association AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA 214 Australian Payments Clearing Association Limited ABN 12 55 136 519 CONTENTS OVERVIEW 1 SECTION 1 Fraud rates 4 SECTION
Cumberland Business Debit Card. Terms & Conditions
Cumberland Business Debit Card Terms & Conditions These Conditions apply to the use of business debit cards issued by Cumberland Building Society ( the Society ) by which you can: withdraw money, or obtain
Merchant Payment Card Processing Guidelines
Merchant Payment Card Processing Guidelines The following is intended to provide guidance that departments or units can use to help develop specific procedures for their department or unit. If you have
RFID Technology in Payment Cards
CISBC/YT Financial Crime Awareness Bulletin UNCLASSIFIED (Public Version) Inside this issue: Global/Canada 2 Credit cards 3 Debit cards 4 Remarks 5 RFID stands for Radio-Frequency IDentification. The acronym
Actorcard Prepaid Visa Card Terms & Conditions
Actorcard Prepaid Visa Card Terms & Conditions These Terms & Conditions apply to your Actorcard prepaid Visa debit card. Please read them carefully. In these Terms & Conditions: "Account" means the prepaid
EFTPOS Merchant Facilities Quick Reference Guide
EFTPOS Merchant Facilities Quick Reference Guide How to Use this Guide This handy Quick Reference Guide has been designed to give you step-by-step, easy-to-follow instructions on how to correctly use your
Visa Debit Card Conditions of Use.
Visa Debit Card Conditions of Use. Your Visa Debit Card gives you all the benefits of an EFTPOS card and more. That s because now you can shop everywhere you would with EFTPOS and anywhere VISA is accepted.
Frequently Asked Questions (FAQ) on HSBC Chip Credit Cards
Frequently Asked Questions (FAQ) on HSBC Chip Credit Cards Cards issued by The HongKong and Shanghai Banking Corporation Limited, India (HSBC) 1. What is EMV Chip Card? EMV (Europay MasterCard Visa) is
TABLE OF CONTENTS. Sabric Card Fraud Booklet 2014. Debit Card Fraud. How Does RSA Compare Internationally? Fraud Types
TABLE OF CONTENTS Summary Sabric Card Fraud Booklet 2014... 3 Qualification of Information... 4 National Overview of Card Fraud (2006-2014)... 5 Credit Card Fraud... Where Does the Fraudulent Expenditure
U.S. Bank. U.S. Bank Chip Card FAQs for Program Administrators. In this guide you will find: Explaining Chip Card Technology (EMV)
U.S. Bank U.S. Bank Chip Card FAQs for Program Administrators Here are some frequently asked questions Program Administrators have about the replacement of U.S. Bank commercial cards with new chip-enabled
American Express Contactless Payments
PRODUCT CAPABILITY GUIDE American Express Contactless Payments American Express Contactless Payments Help Enable Increased Convenience For Card Members At The Point Of Sale American Express contactless
Fraud Management in the Credit Card Industry 1
Fraud Management in the Credit Card Industry 1 Peter Burns Anne Stanley April 2002 Summary: On November 16, 2001, the Payment Cards Center of the Federal Reserve Bank of Philadelphia sponsored a workshop
BANK OF BARODA (NEW ZEALAND) LIMITED (BOBNZ) VISA CLASSIC DEBIT CARD. User Guide
BANK OF BARODA (NEW ZEALAND) LIMITED (BOBNZ) VISA CLASSIC DEBIT CARD User Guide Table of Contents Page No Welcome 2 Know your Visa Classic Debit Card 3 Important Information 4 Keeping your Visa Card safe
Finance & Accounting and Merchant Services
Finance & Accounting and Merchant Services Cardholder Information Security Program (CISP) Training Guide Disclaimer: The information in this guide is current as of the date of publishing. However, card
Integrated EFTPOS User Guide
business Integrated EFTPOS User Guide www.bendigobank.com.au Table of contents Keypad layout....3 Debit card purchase...4 Credit and charge card purchase...5 Processing a tip (restaurants only)...6 Pre-authorisation
Mitigating Fraud Risk Through Card Data Verification
Risk Management Best Practices 11 September 2014 Mitigating Fraud Risk Through Card Data Verification AP, Canada, CEMEA, LAC, U.S. Issuers, Processors With a number of cardholder payment options (e.g.,
Procedure guide. For a smoother operation
Procedure guide For a smoother operation Welcome This procedure guide forms part of your Agreement with Barclaycard and replaces all previous editions of the procedure guide with immediate effect. These
Another Legal Guide from Bonallack & Bishop Solicitors
Another Legal Guide from Bonallack & Bishop Solicitors 80 PRACTICAL TIPS TO HELP COMBAT ALL YOU NEED TO KNOW INTRODUCTION... Over the last few years, identity theft has become one of the fastest growing
MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009
MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 Current Laws: A person may not knowingly, willfully, and with
Your guide to getting the most from your card
Your guide to getting the most from your card Ulster Bank debitcard Welcome to your Ulster Bank debitcard Your Ulster Bank Debitcard is accepted in 30 million retail outlets around the world, wherever
Chip Card (EMV ) CAL-Card FAQs
U.S. Bank Chip Card (EMV ) CAL-Card FAQs Below are answers to some frequently asked questions about the migration to U.S. Bank chipenabled CAL-Cards. This guide can help ensure that you are prepared for
EFTPOS Merchant Facilities Quick Reference Guide (T4220/M4230)
EFTPOS Merchant Facilities Quick Reference Guide (T4220/M4230) How to Use this Guide This handy Quick Reference Guide has been designed to give you step-by-step, easy-to-follow instructions on how to correctly
Clark Brands Payment Methods Manual. First Data Locations
Clark Brands Payment Methods Manual First Data Locations Table of Contents Introduction... 3 Valid Card Types... 3 Authorization Numbers, Merchant ID Numbers and Request for Copy Fax Numbers... 4 Other
Helping you to protect yourself against fraud and financial crime
Helping you to protect yourself against fraud and financial crime first direct takes fraud & other financial crimes very seriously. Even though we have market-leading fraud detection systems, we want you
Many of these tips are just common sense and others are tips to keep in mind when doing a transaction, at ATMs, restaurants and merchants.
Credit and Debit Card Security Tips Many of these tips are just common sense and others are tips to keep in mind when doing a transaction, at ATMs, restaurants and merchants. Be careful with your PIN Always
WASHINGTON IDENTITY THEFT RANKING BY STATE: Rank 13, 76.4 Complaints Per 100,000 Population, 4942 Complaints (2007) Updated January 11, 2009
WASHINGTON IDENTITY THEFT RANKING BY STATE: Rank 13, 76.4 Complaints Per 100,000 Population, 4942 Complaints (2007) Updated January 11, 2009 Current Laws: Washington s identity theft law states that no
Revised March 2015. take a closer look Your easy-to-follow guide to checking your banknotes
Revised March 205 take a closer look Your easy-to-follow guide to checking your banknotes INTRODUCTION Maintaining confidence in the currency is a key objective of the Bank of England, and you too can
New Account Reference Guide
New Account Reference Guide Welcome to BBVA Compass Merchant Services Thank you for choosing BBVA Compass as your Merchant Services provider. BBVA Compass is dedicated to providing your business with the
Protecting the POS Answers to Your Frequently Asked Questions
Protecting the POS Answers to Your Frequently Asked Questions PROTECTING THE POS What is skimming? Skimming is the transfer of electronic data from one magnetic stripe to another for fraudulent purposes.
Your guide to getting the most from your card
Your guide to getting the most from your card Ulster Bank debitcard Welcome to your Ulster Bank debitcard Your Ulster Bank debitcard is accepted in 30 million outlets around the world wherever you see
With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.
With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more
BWA Merchant Services. Credit Card Fraud Protection User Guide
1 BWA Merchant Services Credit Card Fraud Protection User Guide 2 Contents: 1. How to reduce the risk of card present fraud... 3 2. How to reduce the risk of card not present fraud... 5 3. Delivering the
Credit/Debit Card Processing Requirements and Best Practices. Adele Honeyman Oregon State Treasury Training Specialist
Credit/Debit Card Processing Requirements and Best Practices Adele Honeyman Oregon State Treasury Training Specialist 1 What? What do I need to know about excepting credit cards? Who s involved, how it
Prepaid Card Terms and Conditions
Prepaid Card Terms and Conditions These terms and conditions apply to your Prepaid Card. You must read them carefully. In these terms and conditions "you" means the named Prepaid Cardholder and the authorised
Understand the Business Impact of EMV Chip Cards
Understand the Business Impact of EMV Chip Cards 3 What About Mail/Telephone Order and ecommerce? 3 What Is EMV 3 How Chip Cards Work 3 Contactless Technology 4 Background: Behind the Curve 4 Liability
FAQ Credit Card (PIN & PAY)
FAQ Credit Card (PIN & PAY) Communication 1. When would communication go out to customers on the implementation? We are in the midst of preparing notification/letter to Cardhoder on the implementation
Visa Acceptance Guide for the Lodging Industry
Visa Acceptance Guide for the Lodging Industry A Reference Guide to Visa Operational Procedures and Special Services for Lodging Industry Professionals Visa Acceptance Guide for the Lodging Industry A
Merchant Operating Guide
PB 1 Merchant Operating Guide ANZ FastPay MOBILE PAYMENT SOLUTION Contents 1. Welcome 4 1.1 Merchant Agreement 4 1.2 Contact Details 4 1.3 How to get started 4 1.4 Authorisation 4 1.4.1 Authorisation Declined
EFTPOS Merchant Facilities Quick Reference Guide (VX520/VX680)
EFTPOS Merchant Facilities Quick Reference Guide (VX520/VX680) How to Use this Guide This handy Quick Reference Guide has been designed to give you step-by-step, easy-to-follow instructions on how to correctly
W.A.R.N. Passive Biometric ID Card Solution
W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused
HSBC Visa Debit Card. Making the most of your card. HSBC Customer Service Centre. Go to hsbc.com.au/debit
HSBC Customer Service Centre Go to hsbc.com.au/debit Call 1300 308 008 from Australia +61 2 9005 8131 from Overseas 24 hours a day, 7 days a week ^Visa Zero Liability subject to investigation of unauthorised
Arab Bank Cards User Guide
Arab Bank Cards User Guide 4600900 arabbank.jo A card to suit every lifestyle Coming to you from the largest Arab banking network, Arab Bank Cards entitle you to a host of benefits designed to offer you
Visa Debit Card User Guide
Visa Debit Card User Guide Visa Debit Card User Guide Introducing the card This user guide explains how our Visa debit card service works in conjunction with your account. You are welcome to contact our
FUTURE PROOF TERMINAL QUICK REFERENCE GUIDE. Review this Quick Reference Guide to. learn how to run a sale, settle your batch
QUICK REFERENCE GUIDE FUTURE PROOF TERMINAL Review this Quick Reference Guide to learn how to run a sale, settle your batch and troubleshoot terminal responses. INDUSTRY Retail and Restaurant APPLICATION
EMV and Small Merchants:
September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service
How To Spot & Prevent Fraudulent Credit Card Activity
Datalink Bankcard Services How To Spot & Prevent Fraudulent Credit Card Activity White Paper 2013 According to statistics from the U.S. Department of Justice and the Consumer Sentinel Network, credit card
ATM FRAUD AND COUNTER MEASURES
ATM FRAUD AND COUNTER MEASURES GENESIS OF ATMs An automated teller machine was first introduced in 1960 by City Bank of New York on a trial basis. The concept of this machine was for customers to pay utility
OpenEdge Research & Development Group April 2015
2015: Security, Merchant Readiness & the Coming Liability Shift OpenEdge Research & Development Group April 2015 [email protected] openedgepay.com 2015: Security, Merchant Table of Contents The
TOP TRUMPS Comparisons of how to pay for goods and services online
Cash Cash is legal tender in the form of bank notes and coins Small value purchases e.g. cafes, shops Pocket money Repaying friends Cash is physically transferred from one person to the next, usually face-to-face
Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011
Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011 On 5 th March 2010, The Association of Banks in Singapore announced key measures to adopt a holistic
Financial Transactions and Fraud Schemes
Financial Transactions and Fraud Schemes Asset Misappropriation: Fraudulent Disbursements Fraudulent Disbursement Schemes Register disbursement schemes Check tampering schemes Payroll schemes Billing schemes
CREDIT CARD FRAUD PROTECTION. how to protect your business and your customers
CREDIT CARD FRAUD PROTECTION how to protect your business and your customers INTRODUCTION It is an unfortunate fact that many businesses will encounter a customer who presents a credit card or a credit
Credit Card Processing Glossary
Address Verification: A service provided through which the merchant verifies the Cardholder s address. Primarily used by Mail/Telephone order merchants. Not a guarantee that a transaction is valid. Agreement:
PAGE ONE Economics CLASSROOM EDITION. The Smart-Chip Credit Card: A Current Solution
PAGE ONE Economics CLASSROOM EDITION An informative and accessible economic essay with a classroom application. Includes the full version of Page One Economics, plus questions for students and an answer
Card Acceptance Best Practices Playing it Safe at the Point of Sale
White Paper Card Acceptance Best Practices Playing it Safe at the Point of Sale Fraudulent activity costs U.S. businesses billions. And that is just lost revenue. When you consider the associated damage
Merchant Best Practices & Guidelines
National Bank of Abu Dhabi Merchant Best Practices & Guidelines Merchant Advice Version 1.0 January 24, 2016 Table of Content 1. Guidelines to reduce Merchant Risks... 3 1.1 Card Present Transactions...
Payment Card Industry Data Security Standard PCI DSS
Payment Card Industry Data Security Standard PCI DSS What is PCI DSS? Requirements developed by the five card brands: VISA, Mastercard, AMEX, JCB and Discover. Their aim was to put together a common set
POINT OF SALE PROCEDURES
All it takes. POINT OF SALE PROCEDURES MERCHANT GUIDE About this guide...1 How Visa helps your business...1 Accepting Visa cards...2 Identifying Visa cards...3 Authorizing transactions...5 Electronic transactions
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally
Welcome to the convenience of a Bank of Melbourne. Visa Debit Card.
Welcome to the convenience of a Bank of Melbourne Visa Debit Card. Everyday Purchases Type of transaction ATM cash withdrawal In-store purchase In-store cash-out Bill payment How to access funds in Australia
The need for a secure & trusted payment instrument in e-commerce. Ali AlMeshal
The need for a secure & trusted payment instrument in e-commerce Ali AlMeshal In Physical/Real World Hand over card Visual check Swipe in POS Online authorization Receipt with signature panel Sign or Pin
