Card Acceptance Best Practices Playing it Safe at the Point of Sale
|
|
|
- Ashlynn Preston
- 10 years ago
- Views:
Transcription
1 White Paper Card Acceptance Best Practices Playing it Safe at the Point of Sale Fraudulent activity costs U.S. businesses billions. And that is just lost revenue. When you consider the associated damage to reputations, the cost of fraud is astronomical. And it keeps growing. In spite of technological advances and other developments, criminals are still finding ways to carry out fraudulent activity especially those targeting POS systems. Should they come your way, there are steps you can take to lock them out and limit your risk. Recognize the warning signs. They are different for card-present and card not-present transactions. Make sure you and your employees know what they are. Follow best practices. Ensure everyone with customer contact knows how to properly accept a card for payment and follows best practices outlined below. Best practices are different for chip and magnetic stripe card-present and card-not-present transactions. Card-Present Transactions Having a card available for payment does not always ensure a safe transaction. There are several warning signs, and best practices to prevent card-present fraud. Warning Signs of Card-Present Fraud Certain customer behaviors could point to card fraud, but don t necessarily indicate criminal activity. Become familiar with your customers and let your instincts steer you in the right direction. Watch for customers who: Purchase a large amount of merchandise without regard to size, style, color or price Try to distract or rush you during the sale Make purchases and leave the store, then return to make another purchase Make large purchases just after opening or as the store is closing Refuse free delivery for large items Card-Present Best Practices (Chip Cards) Chip cards are extraordinarily difficult to duplicate. The use of stronger authentication methods and unique transaction elements make chip card data less attractive to steal, and render it nearly impossible to commit counterfeit fraud. In most POS situations, the cardholder, not the business owner, inserts the card into the terminal. Use the following best practices when accepting a chip card. 1. Ask your customer to insert their card into a chip ready device and leave it in the device during the entire transaction. 2. The chip card and terminal will determine if a PIN or signature is required for verification.
2 3. If a PIN is required, the device prompts the customer to enter it. (When a PIN-based transaction is approved, the customer retrieves the chip card from the terminal. There is no opportunity for the business owner to examine the card.) 4. If the transaction is PIN-verified, there is no need for a signature. 5. If the customer does not know their PIN, ask for another form of payment. 6. Print a copy of the transaction receipt for the customer. 7. If the transaction is not PIN-based, the receipt will have a signature line for the customer to sign. 8. Ask the customer for their card to compare signatures from the receipt and the back of the chip card. Do not accept an unsigned card. If the POS terminal cannot read the chip on the card, follow fallback acceptance procedures and swipe the card s magnetic stripe or key enter the data. Warning: swiping or key-entering a transaction increases the risk of accepting a counterfeit card because the chip information is not available. And, with the October 1, 2015 liability shift, liability for chip card-present fraud shifts to whoever is not using chip technology. Card-Present Best Practices (Magnetic Stripe Cards) Use the following best practices when accepting magnetic stripe card-present purchases. 1. Check the card security features to make sure that the card has not been altered. 2. Swipe the stripe through the terminal in one direction only. 3. Check the authorization response and take appropriate action Authorization Response Approved Declined Call or Call Center Pick Up No Match Appropriate Action Ask the customer to sign the sales receipt. Return the card and ask for another method of payment. Call your voice authorization center and follow the prompts. Keep the card if it can be done peacefully. Swipe the card and re-key the last four didgits. If no match appears again, keep the card if it can be done peacefully. Request a Code 10 authorization. 4. Get the cardholder s signature on the transaction receipt. 5. Compare the name, account number, and signature on the card to those on the transaction receipt. They should match. If a card cannot be swiped, card account data must be entered into a POS terminal. A word of warning: key-entering a transaction increases the risk of accepting a counterfeit card because the magnetic stripe information is not available. Microchip Card Brand security character Signature Embossed account number V Hologram Printed number 2
3 Use the following steps when key-entering a transaction: 1. Check the POS terminal to ensure it is operating properly. If the terminal is OK and the problem appears to be with the card s magnetic stripe, continue to step Match the account number. Verify the embossed account number on the front of the cards matches the number indent-printed on the back. 3. Check the expiration date. Look at the good thru or valid thru date to be sure the card hasn t expired. If the card has a valid from date, be sure the card isn t being used before it is valid. 4. Follow any prompts, including requests for entering the CVV. If the card does not have a legible CVV, consider asking for another method of payment. 5. Check the signature on the card to ensure it matches the signature on the sales draft. Do not accept an unsigned card. If you suspect fraud, immediately make a Code 10 call to your voice authorization center. Card-Not-Present Transactions Businesses accepting card-not-present purchases must take extra precautions to limit exposure to fraud, including investment in additional technology and establishment of individual risk and fraud parameters. Card-Not-Present Warning Signs When more than one of the following occurs during a card-not-present transaction, fraud might be involved. Follow up, just in case. First-time shopper. Criminals are always looking for new victims. Larger-than-normal orders. Because stolen cards or account numbers have a limited life span, crooks need to maximize the size of their purchases. Orders that include several of the same item. Receiving multiples of the same item increases a criminal s profits. Orders made up of big-ticket items. These items have maximum resale value and maximum profit potential. Rush or overnight shipping. Crooks want their fraudulently obtained items as soon as possible, and since they aren t paying, they aren t concerned about extra delivery charges. Shipping to an international address. A significant number of fraudulent transactions are shipped to fraudulent cardholders outside of the U.S. Transactions with similar account numbers. This is often a signal the account numbers have been generated using software available on the Internet. Shipping to a single address, but transactions placed on multiple cards. This could indicate an account number generated by special software, or a batch of stolen cards. Multiple transactions on one card over a very short period of time. Often this is an attempt to run a card until an account is closed. Multiple transactions on one card or a similar card with a single billing address, but multiple shipping addresses. A signal of organized activity rather than a single fraudster at work. In online transactions, multiple cards used from a single IP (Internet Protocol) address. The use of more than one or two cards could indicate a fraud scheme. Orders from Internet addresses that offer free services. These services involve no billing relationships, and often offer neither an audit trail nor verification that a legitimate cardholder has opened the account. 3
4 Card-Not-Present Best Practices Take the following steps to stay ahead of crooks and reduce your fraud exposure when accepting card-not-present transactions. 1. Get an authorization. 2. Ask for the card expiration date and include it in your authorization request. An invalid or missing expiration date can indicate the person on the other end does not have the actual card in hand. 3. Use fraud detection tools like Address Verification Service (AVS) and Card Verification Value (CVV) as part of your authorization process. 4. Be on the lookout for questionable transaction data or other signs indicating an out of pattern order. 5. If you receive an authorization but still suspect fraud: a. Ask for additional information (e.g., request the financial institution name on the card). b. Contact the cardholder with any questions. c. Confirm the order separately by sending a note via the customer s billing address rather than the ship-to address. Remember, an authorization is not a guarantee of payment. An authorization means funds are available and the card has not yet been reported as lost or stolen. In all cases, if you suspect fraud, immediately make a Code 10 call to your voice authorization center. Code 10 If you suspect fraud at any time during the transaction process, you can make a Code 10 authorization request. This alerts the card issuer to the suspicious activity, without alerting the customer. Code 10 steps: Keep the card in hand to quickly respond to questions. Call your voice authorization center and follow the prompts for a Code 10 authorization o If you care transferred to the card issuer, you may be asked a series of yes/no questions. You re Not Alone Business owners using TSYS Merchant Solutions for their processing are not fighting fraud alone. TSYS Merchant Solutions takes fraud very seriously, and has numerous safeguards in place to reduce risk. TSYS Merchant Solutions state-of-the-art processing platform includes fraud-detecting technology that monitors transactions for suspicious activity. If a questionable transaction is uncovered, a customer service representative will call the affected business owner to verify information. TSYS Merchant Solutions screens business owners accounts and infrastructure to ensure technology is set up correctly. TSYS Merchant Solutions has representatives who sit on industry and card brand committees focused on reducing fraud. TSYS Merchant Solutions maintains close associations with government agencies and fraud-fighting groups to stay abreast of fraudulent activity and the latest crime fighting efforts. Adding layers of security not only protect your customers data, they safeguard your reputation and business. TSYS Merchant Solutions has a portfolio of security solutions available to help safeguard your business. 4
5 Next-Generation Credit Card Machines A complete line of credit card terminals that make accepting cards and other payments a seamless part of your business. Terminals are EMV and NFC enabled to accept today s payment types such as Apple Pay and Samsung Pay, and are easily updated to accept future payment options. TSYS Merchant Solutions Guardian SM Security solutions to help protect your business from cyber criminals and the overwhelming cost of a data breach. TSYS Guardian Security Suite includes: o Encryption/Tokenization Industry-leading protection for credit card data that converts account information into random, unreadable formats during the transaction process. o Card-Compromise Assistance Plan (C-CAP) A unique assistance plan that provides up to $100,000 per merchant identification number to pay expenses associated with a real or suspected data breach. o PCI Validation Assistance with meeting mandatory data security requirements to protect cardholder account information. WHO WE ARE TSYS Merchant Solutions is a leading payment processor with more than 30 years of experience providing first-rate service and comprehensive end-toend payment solutions to businesses accepting payments across North America. Our dedicated, experienced team of industry professionals provides innovative card-acceptance solutions and unparalleled customer service every day to meet the long-term needs of our customers. TSYS Merchant Solutions is a wholly owned subsidiary of TSYS (NYSE: TSS). TSYS delivers advanced technology and enhanced value to many of the world s leading companies, making it possible for hundreds of millions of consumers to use their credit, debit, commercial, privatelabel, prepaid and chip cards safely and securely. Look for more fraud prevention, security and reference guides at and to learn more contact or [email protected] Total System Services, Inc.. All rights reserved worldwide. Total System Services, Inc., and TSYS are federally registered service marks of Total System Services, Inc., in the United States. Total System Services, Inc., and its affiliates own a number of service marks that are registered in the United States and in other countries. All other products and company names are trademarks of their respective companies. TSYS Merchant Solutions is a registered ISO/MSP of both First National Bank of Omaha, Omaha, Nebraska, and Synovus Bank, Columbus, Georgia. (11/2015)
Best Practices for Internet Merchants
Best Practices for Internet Merchants The following best practices, taken from various experts, are offered to help you avoid being victimized by Internet fraud. Experience suggests that there are certain
Acceptance to Minimize Fraud
Best Practices for Credit Card Acceptance to Minimize Fraud By implementing best practices in credit card processing, you decrease the likelihood of fraudulent transactions and chargebacks. In general,
How To Spot & Prevent Fraudulent Credit Card Activity
Datalink Bankcard Services How To Spot & Prevent Fraudulent Credit Card Activity White Paper 2013 According to statistics from the U.S. Department of Justice and the Consumer Sentinel Network, credit card
New Account Reference Guide
New Account Reference Guide Welcome to BBVA Compass Merchant Services Thank you for choosing BBVA Compass as your Merchant Services provider. BBVA Compass is dedicated to providing your business with the
PROTECT YOUR BUSINESS FROM LOSSES WHILE ACCEPTING CREDIT CARDS
PROTECT YOUR BUSINESS FROM LOSSES WHILE ACCEPTING CREDIT CARDS TABLE OF CONTENTS Introduction...1 Preventing Fraud in a Card-Present Environment...2 How to Reduce Chargebacks in a Card-Present Environment...4
A multi-layered approach to payment card security.
A multi-layered approach to payment card security. CARD-NOT-PRESENT 1 A recent research study revealed that Visa cards are the most widely used payment method at Canadian websites, on the phone, or through
EMV EMV TABLE OF CONTENTS
2 TABLE OF CONTENTS Intro... 2 Are You Ready?... 3 What Is?... 4 Why?... 5 What Does Mean To Your Business?... 6 Checklist... 8 3 U.S. Merchants 60% are expected to convert to -enabled devices by 2015.
Credit/Debit Card Processing Requirements and Best Practices. Adele Honeyman Oregon State Treasury Training Specialist
Credit/Debit Card Processing Requirements and Best Practices Adele Honeyman Oregon State Treasury Training Specialist 1 What? What do I need to know about excepting credit cards? Who s involved, how it
How To Understand The Law Of Credit Card Usage
Glossary Note: All definitions listed in this section are also available in the Course Glossary. You can access the course Glossary online by clicking the Glossary link in the Materials section of the
Global Visa Card-Not-Present Merchant Guide to Greater Fraud Control. Protect Your Business and Your Customers with Visa s Layers of Security
Global Visa Card-Not-Present Merchant Guide to Greater Fraud Control Protect Your Business and Your Customers with Visa s Layers of Security Millions of Visa cardholders worldwide make one or more purchases
Merchant Services. How to help protect your business
Please immediately report any suspicious activity involving credit card or debit card use to TD Merchant Services at 1-800-6-116 For more information, visit www.tdmerchantservices.com Merchant Services
Clark Brands Payment Methods Manual. First Data Locations
Clark Brands Payment Methods Manual First Data Locations Table of Contents Introduction... 3 Valid Card Types... 3 Authorization Numbers, Merchant ID Numbers and Request for Copy Fax Numbers... 4 Other
OpenEdge Research & Development Group April 2015
2015: Security, Merchant Readiness & the Coming Liability Shift OpenEdge Research & Development Group April 2015 [email protected] openedgepay.com 2015: Security, Merchant Table of Contents The
Merchant Guide to the Visa Address Verification Service
Merchant Guide to the Visa Address Verification Service Merchant Guide to the Visa Address Verification Service TABLE OF CONTENTS Table of Contents Merchant Guide to the Visa Address Verification Service
Avoiding Fraud. Learn to recognize the warning signs for fraud and follow these card acceptance guidelines to reduce your risk.
Avoiding Fraud Learn to recognize the warning signs for fraud and follow these card acceptance guidelines to reduce your risk. Intoduction Fraud comes in many forms and hurts merchants of all sizes. Whether
Credit Card Processing Glossary
Address Verification: A service provided through which the merchant verifies the Cardholder s address. Primarily used by Mail/Telephone order merchants. Not a guarantee that a transaction is valid. Agreement:
General Industry terms
General Industry terms Address Verification: A service provided through which the merchant verifies the Cardholder s address. Primarily used by Mail/Telephone order merchants. Not a guarantee that a transaction
Mitigating Fraud Risk Through Card Data Verification
Risk Management Best Practices 11 September 2014 Mitigating Fraud Risk Through Card Data Verification AP, Canada, CEMEA, LAC, U.S. Issuers, Processors With a number of cardholder payment options (e.g.,
What Merchants Need to Know About EMV
Effective November 1, 2014 1. What is EMV? EMV is the global standard for card present payment processing technology and it s coming to the U.S. EMV uses an embedded chip in the card that holds all the
TSYS Merchant Solutions delivering years to come
Activation Kit Thank you for choosing TSYS Merchant Solutions as your payment processor. We are honored to serve you. We look forward to delivering your payment processing needs now and for years to come.
FUTURE PROOF TERMINAL QUICK REFERENCE GUIDE. Review this Quick Reference Guide to. learn how to run a sale, settle your batch
QUICK REFERENCE GUIDE FUTURE PROOF TERMINAL Review this Quick Reference Guide to learn how to run a sale, settle your batch and troubleshoot terminal responses. INDUSTRY Retail and Restaurant APPLICATION
Understand the Business Impact of EMV Chip Cards
Understand the Business Impact of EMV Chip Cards 3 What About Mail/Telephone Order and ecommerce? 3 What Is EMV 3 How Chip Cards Work 3 Contactless Technology 4 Background: Behind the Curve 4 Liability
Merchant Payment Card Processing Guidelines
Merchant Payment Card Processing Guidelines The following is intended to provide guidance that departments or units can use to help develop specific procedures for their department or unit. If you have
Getting Started. Quick Reference Guide for Payment Processing
Getting Started Quick Reference Guide for Payment Processing In today s competitive landscape, you have many choices when it comes to selecting your payments provider, and we appreciate your business.
Preparing for EMV chip card acceptance
Preparing for EMV chip card acceptance Ben Brown Vice President, Regional Sales Manager, Wells Fargo Merchant Services Lily Page Vice President, Wholesale ereceivables, Wells Fargo Merchant Services June
Version 15.3 (October 2009)
Copyright 2008-2010 Software Technology, Inc. 1621 Cushman Drive Lincoln, NE 68512 (402) 423-1440 www.tabs3.com Portions copyright Microsoft Corporation Tabs3, PracticeMaster, and the pinwheel symbol (
Visa Tips for Restaurant Staff
Visa Tips for Restaurant Staff Helpful Information and Best Practices for Handling Visa Transactions For U.S. Only When it comes to restaurants, most customers are looking for the same basic things...
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved
Fraud Minimisation, Data Security and Chargeback Guide SECURING YOUR BUSINESS
Fraud Minimisation, Data Security and Chargeback Guide SECURING YOUR BUSINESS Fraud Minimisation and Chargeback Guide Fraud is a problem for many merchants and can have a substantial financial impact
CREDIT CARD FRAUD PROTECTION. how to protect your business and your customers
CREDIT CARD FRAUD PROTECTION how to protect your business and your customers INTRODUCTION It is an unfortunate fact that many businesses will encounter a customer who presents a credit card or a credit
Payment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc.
Payment Methods The cost of doing business Michelle Powell - BASYS Processing, Inc. You ve got to spend money, to make money Major Industry Topics Industry Process Flow PCI DSS Compliance Risks of Non-Compliance
> Every Card. Every Time.
> Every Card. Every Time. Fraud Prevention Program Reference Guide Moneris SOLUTIONS Moneris Solutions Fraud Prevention Reference Guide > Every Card. Every Time. Table of Contents Suspicious customer behaviour
PREVENTING PAYMENT CARD DATA BREACHES
NEW SCIENCE TRANSACTION SECURITY ARTICLE PREVENTING PAYMENT CARD DATA BREACHES DECEMBER 2014 UL.COM/NEWSCIENCE NEW SCIENCE TRANSACTION SECURITY OVERVIEW From research on the latest electronic transaction
TSYS Managed Services. Reduce your fraud exposure and losses by utilizing Fraud Mitigation Services from
Solutions Overview Full Suite of Managed Services for Mitigating Fraud Leverage our global visibility to identify and prevent fraud Select from a suite of services to meet your needs Reduce your fraud
Chargeback Reason Code List - U.S.
AL Airline Transaction Dispute AP Automatic Payment AW Altered Amount CA Cash Advance Dispute CD Credit Posted as Card Sale CR Cancelled Reservation This chargeback occurs because of a dispute on an Airline
EFTPOS Merchant Facilities Quick Reference Guide
EFTPOS Merchant Facilities Quick Reference Guide How to Use this Guide This handy Quick Reference Guide has been designed to give you step-by-step, easy-to-follow instructions on how to correctly use your
Visa Merchant Best Practice Guide for Cardholder Not Present Transactions
Visa Merchant Best Practice Guide for Cardholder Not Present Transactions Table of Contents Section 1 About This Guide 03 Section 2 Merchant Procedures 05 Section 3 Authorisation 07 Authorisation Procedures
Chip Card (EMV ) CAL-Card FAQs
U.S. Bank Chip Card (EMV ) CAL-Card FAQs Below are answers to some frequently asked questions about the migration to U.S. Bank chipenabled CAL-Cards. This guide can help ensure that you are prepared for
What is EMV? What is different?
U.S. consumers are receiving new debit and credit cards with embedded chip technology that better stores and protects cardholder information. These new chip cards are part of the new card standard, Europay,
EMV FAQs. Contact us at: [email protected]. Visit us online: VancoPayments.com
EMV FAQs Contact us at: [email protected] Visit us online: VancoPayments.com What are the benefits of EMV cards to merchants and consumers? What is EMV? The acronym EMV stands for an organization formed
EMV's Role in reducing Payment Risks: a Multi-Layered Approach
EMV's Role in reducing Payment Risks: a Multi-Layered Approach April 24, 2013 Agenda EMV Rationale Why is this worth the effort? Guides how we implement it EMV Vulnerability at the POS EMV Impact on CNP
Retrieval & Chargeback Best Practices
Retrieval & Chargeback Best Practices A Merchant User s Guide to Help Manage Disputes Version Three November, 2010 www.firstdata.com THIS PAGE INTENTIONALLY LEFT BLANK. Developed by: First Data Payment
FREQUENTLY ASKED QUESTIONS - CHARGEBACKS
FREQUENTLY ASKED QUESTIONS - CHARGEBACKS # Questions Answer 1 What is a Chargeback? A Chargeback is the term used by Banks for debiting a merchant s bank account due to successful return of a transaction
Fraud Minimisation Guide ANZ Merchant Business Solutions
Fraud Minimisation Guide ANZ Merchant Business Solutions INTRODUCTION Fraud can occur in and is a risk for any business that accepts credit cards and it can have a significant financial impact on your
YOUR GUIDE TO SAFER, SMARTER CREDIT CARD PAYMENTS. What you need to know about chargebacks and fraud on mail, telephone, IVR and Internet orders
YOUR GUIDE TO SAFER, SMARTER CREDIT CARD PAYMENTS What you need to know about chargebacks and fraud on mail, telephone, IVR and Internet orders Contents HELPING YOU PROTECT YOUR BUSINESS AND YOUR PROFITS
Finance & Accounting and Merchant Services
Finance & Accounting and Merchant Services Cardholder Information Security Program (CISP) Training Guide Disclaimer: The information in this guide is current as of the date of publishing. However, card
EMV : Frequently Asked Questions for Merchants
EMV : Frequently Asked Questions for Merchants The information in this document is offered on an as is basis, without warranty of any kind, either expressed, implied or statutory, including but not limited
EMV and Small Merchants:
September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service
Eagle POS Procedure Guide For Epicor Bankcard Processing
Eagle POS Procedure Guide For Epicor Bankcard Processing Table of Contents Introduction... 3 1 Transactions using a Swiped Bankcard... 3 Basic Swiped Credit Card Sale & Return transaction... 3 Sales &
VOICE AUTHORIZATION QUICK REFERENCE GUIDE. Get credit card authorizations. using any touch-tone telephone. enter the authorization codes
QUICK REFERENCE GUIDE VOICE AUTHORIZATION Get credit card authorizations using any touch-tone telephone enter the authorization codes when your POS system is ready. FOR MORE INFORMATION Visit ChasePaymentech.com
Tokenization: FAQs & General Information. www.tsys.com BACKGROUND. GENERAL INFORMATION What is Tokenization?
FAQ Tokenization: FAQs & General Information BACKGROUND As technology evolves, consumers are increasingly making their purchases online or through mobile devices and digital wallet applications and their
EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems
October 2014 EMV and Restaurants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service marks
The Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online.
1 February 2010 Volume 2, Issue 1 The Merchant Serving Florida State University s Payment Card Community Individual Highlights: Skimming Scam 1 Skimming at Work 2 Safe at Home 3 Read your Statement 4 Useful
Global Airline Merchant Best Practices Guide
Global Airline Merchant Best Practices Guide Global Airline Merchant Best Practices Guide Table of Contents Introduction...1 Disclaimer... 1 Airline Card-Not-Present Fraud Prevention and Best Practices...
Prevention Is Better Than Cure EMV and PCI
Prevention Is Better Than Cure EMV and PCI Prevention Is Better Than Cure An independent view on the effectiveness of EMV and PCI in case of large-scale card compromise. Over the past couple of months,
CRM4M Accounting Set Up and Miscellaneous Accounting Guide Rev. 10/17/2008 rb
CRM4M Accounting Set Up and Miscellaneous Accounting Guide Rev. 10/17/2008 rb Topic Page Chart of Accounts 3 Creating a Batch Manually 8 Closing a Batch Manually 11 Cancellation Fees 17 Check Refunds 19
FAQ on EMV Chip Debit Card and Online Usage
FAQ on EMV Chip Debit Card and Online Usage Security enhancement on HSBC India Debit Card A Secure Debit Card HSBC India Debit Cards are more secure and enabled with the Chip and PIN technology? You can
Merchant Card Processing Best Practices
Merchant Card Processing Best Practices Background: The major credit card companies (VISA, MasterCard, Discover, and American Express) have published a uniform set of data security standards that ALL merchants
Fall Conference November 19 21, 2013 Merchant Card Processing Overview
Fall Conference November 19 21, 2013 Merchant Card Processing Overview Agenda Industry Definition Process Flows Processing Costs Chargeback's Payment Card Industry (PCI) Guidelines for Convenience Fees
Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance
Payment Security White Paper Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance Breaches happen across all industries as thieves look for vulnerabilities.
Card Acceptance Best Practices to Manage Rates and Minimize Risk
Card Acceptance Best Practices to Manage Rates and Minimize Risk Kim Jackson VP, Transfund Merchant Services April 23, 2014 BOK Financial is registered with the National Association of State Boards of
With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.
With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more
PAYMENT SECURITY. Best Practices
PAYMENT SECURITY Best Practices At VeriFone, the protection of cardholder information is a top priority. To ensure merchants have secure payment solutions for their customers, and to help protect merchants
Card Acceptance Guidelines for Visa Merchants
Card Acceptance Guidelines for Visa Merchants Table of Contents Introduction.............................................................. 1 Section 1: Getting Down to Basics..........................................
Heartland Secure. By: Michael English. A Heartland Payment Systems White Paper 2014. Executive Director, Product Development
A Heartland Payment Systems White Paper 2014 Heartland Secure. By: Michael English Executive Director, Product Development 2014 Heartland Payment Systems. All trademarks, service marks and trade names
How To Protect Your Cardholder Data From Fraud
Global Visa Card-Not-Present Merchant Guide to Greater Fraud Control Protect Your Business and Your Customers with Visa s Layers of Security Millions of Visa cardholders worldwide make one or more purchases
Payment System Forum and Exhibition 2014 Sasana Kijang, Kuala Lumpur
Payment System Forum and Exhibition 2014 Sasana Kijang, Kuala Lumpur Enabling Payment Card Acceptance at Small and Medium Enterprises (SMEs) and Microenterprises Part 1: Payment Card Acceptance Infrastructure
CREDIT CARD PROCESSING GLOSSARY OF TERMS
CREDIT CARD PROCESSING GLOSSARY OF TERMS 3DES A highly secure encryption system that encrypts data 3 times, using 3 64-bit keys, for an overall encryption key length of 192 bits. Also called triple DES.
Integrated EFTPOS User Guide
business Integrated EFTPOS User Guide www.bendigobank.com.au Table of contents Keypad layout....3 Debit card purchase...4 Credit and charge card purchase...5 Processing a tip (restaurants only)...6 Pre-authorisation
UNL PAYMENT CARD POLICY AND PROCEDURES. Table of Contents
UNL PAYMENT CARD POLICY AND PROCEDURES Table of Contents Payment Card Merchant Security Standards Policy and Procedures... 2 Introduction... 4 Payment Card Industry Data Security Standard... 4 Definitions...
EMV Frequently Asked Questions for Merchants May, 2014
EMV Frequently Asked Questions for Merchants May, 2014 Copyright 2014 Vantiv All rights reserved. Disclaimer The information in this document is offered on an as is basis, without warranty of any kind,
Visa Acceptance Guide for the Car Rental Industry
Visa Acceptance Guide for the Car Rental Industry Visa Acceptance Guide for the Car Rental Industry Table of Contents About This Guide........................................................ ii Visa Card
Guideline on Debit or Credit Cards Usage
CMSGu2012-04 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Debit or Credit Cards Usage National Computer Board Mauritius
Card Acceptance Guidelines for Visa Merchants
Card Acceptance Guidelines for Visa Merchants Table of Contents Introduction...1 Section 1: Getting Down to Basics...4 Visa Transaction Processing Who is Involved?... 5 Visa Transaction Flow for Magnetic-Stripe
PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:
What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers
Security enhancement on HSBC India Debit Card
Security enhancement on HSBC India Debit Card A Secure Debit Card HSBC India Debit Cards are more secure and enabled with the Chip and PIN technology. In addition to this you can restrict usage of the
Ti ps. Merchant. for Credit Card Transactions. Processing Tips CARD ONE INTERNATIONAL INC
Merchant Processing Tips Ti ps for Credit Card Transactions CARD ONE INTERNATIONAL INC Card One International Inc - Merchant Processing Tips for Card Transactions Page 1 of 11 Merchant Processing Tips
American Express Fraud Prevention Handbook
American Express Fraud Prevention Handbook FP-HAND2000 Cards To heighten your awareness to the problem of fraudulent transactions, American Express produced this handbook as part of our efforts to help
Merchant Best Practices & Guidelines
National Bank of Abu Dhabi Merchant Best Practices & Guidelines Merchant Advice Version 1.0 January 24, 2016 Table of Content 1. Guidelines to reduce Merchant Risks... 3 1.1 Card Present Transactions...
Online Payment Processing What You Need to Know. PayPal Business Guide
Online Payment Processing What You Need to Know PayPal Business Guide PayPal Business Guide Online Payment Processing 2006 PayPal, Inc. All rights reserved. PayPal, Payflow, and the PayPal logo are registered
Table of Contents. 2 TouchSuite Welcome Kit
Welcome Kit Table of Contents Important Account Information... Welcome to TouchSuite Merchant Services... Help Desk Card Enclosed... Your Merchant ID (MID)... 3 3 3 3 Customer Support Numbers... 4 Card
Langara College PCI Awareness Training
Langara College PCI Awareness Training Have you heard of PCI? Due to the increase of credit card fraud and identity theft, major credit card companies like Visa, MasterCard and Amex have formed a security
The State of Play in Cyber Payments Fraud Improving Security for Online & Card Not Present Transactions
The State of Play in Cyber Payments Fraud Improving Security for Online & Card Not Present Transactions Mark Greene, Ph.D CEO, FICO Federal Reserve Bank of Chicago 26 September 2011 Cybercrime Costs 431
BWA Merchant Services. Credit Card Fraud Protection User Guide
1 BWA Merchant Services Credit Card Fraud Protection User Guide 2 Contents: 1. How to reduce the risk of card present fraud... 3 2. How to reduce the risk of card not present fraud... 5 3. Delivering the
How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants
How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants 2012 First Data Corporation. All trademarks, service marks and trade names referenced in this material
