STANDARD MERCHANT ACCEPTANCE POLICY



Similar documents
ACSI Advertising Guidelines Advertising Philosophy

How To Use The Blog Safely And Responsibly

Acceptable Use Policy of UNWIRED Ltd.

Acceptable Use Policy

HUMAN RESOURCES POLICIES & PROCEDURES

Popmoney Frequently Asked Questions

The AppNexus audit evaluates creatives against the standards below.

How To Deal With Social Media At Larks Hill J & I School

Acceptable Use Policy

MTN Mobile Money 2012

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students

Merchant Account Terms of Use

MNI TERMS OF USE. 1. About Moneynetint. 2. Scope of these Terms of Use. 3. Your MNI Account

AXIS12 DRUPAL IN A BOX ON THE CLOUD

Customer Acceptance Policy

Acceptable Use Policy

March KiwiSaver Trade Mark Requirements (New Zealand)

Acceptable Use and Publishing Policy

CODE OF CONDUCT Ethical rules and guidelines

1. Introduction. The laws of any jurisdiction other than England & Wales Taxes or duties Financial investment.

Leadbolt Classification Policy

Terms and conditions of use

Cablelynx Acceptable Use Policy

ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; (COLLECTIVELY BROADVOX )

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Actorcard Prepaid Visa Card Terms & Conditions

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

FirstPrinciples: Our Code of Business Conduct and Ethics

Unibet Tipping Competition Terms and Conditions

International Payment Service Terms and conditions

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy

2015 Campus Safety and Security Survey. Screening Questions. Institution: Main Campus ( ) User ID: C

WEBSITE TERMS OF USE

Department of Homeland Security Management Directives System MD Number: Issue Date: 04/14/2003 PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT

low levels of compliance with the regulations and POCA by negligent HVD operators are enabling criminals to launder the proceeds of crime

JPMA - Terms and Conditions

I. Background information

Using Public Computer Services in Somerset Libraries

Website Terms and Conditions

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Terms Of Services and Website Use - Private Agreement

Acceptable Use Policy

OFFICIAL CONTEST RULES

Card Account means your Card account that is in relation to your Visa Wallet maintained and operated by Tune Money Sdn Bhd.

Zirkel Wirelessʼ Internet Service Agreement (ISA) Read This ISA Carefully Before Using Our Internet Services.

Acceptable Use (Anti-Abuse) Policy

THE WESTERN UNION MONEY TRANSFER SERVICE (THE SERVICE ) SHALL BE MADE AVAILABLE SUBJECT TO THE FOLLOWING CONDITIONS

Internet usage Policy

Social Media. Scope. Computer Use Employee Code of Conduct Privacy Emergency Management Plan Communications Strategy Community Engagement Strategy

Acceptable Usage Policy

MNI Networks Limited Acceptable Use Policy

1. Fill up the form and fax to , or scan and to or send by courier to Lelong.my office.

2015 Campus Safety and Security Survey. Screening Questions

BRIEFING PAPER - Rogue Affiliates Distributing CSAM using Disguised Websites (Public version)

Letter from the Chief Executive Officer and Chairman and the Group Medical Director

DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY

(Unofficial translation by the Financial and Capital Market Commission)

INTERNATIONAL MONEY EXPRESS (IME) LIMITED ONLINE REMIT USER AGREEMENT

Fusion Acceptable Use Policy. Effective Feb 2, 2015

IAAS Product Terms PRODUCT TERMS

INTERNET, AND COMPUTER USE POLICY.

AXIS Bank Internet Gateway Merchant Legal Agreement

BNZ Advantage Credit Card Terms and Conditions.

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Trinity Online Application - Terms and Conditions of Use

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Terms and Conditions. Terms & Conditions. 1. Definitions. 2. Use of the website. 3. Privacy. 4. Purchase of products & gift vouchers

You must not: (a) Copy and republish material from this website (including republication on another website);

Transcription:

Easy, safe and private online payments for everyone STANDARD MERCHANT ACCEPTANCE POLICY Ukash is an established international company that provides an alternative way for people to pay for goods and services online.

Introduction The Ukash payment system enables a consumer to make payments without the need for individual accounts or credit or debit cards, through the use of individually encoded Ukash voucher codes issued in exchange for cash or other cleared funds. Ukash provides an online validation of the presented Ukash voucher code to Participating Merchants enabling the payment to be confirmed. At Ukash we are guided by a value system that is steadfastly focused on building relationships with companies who do business with trust and integrity. Only merchants who comply with this policy, and the guidelines reflected below, will be approved. These guidelines will be updated and varied periodically. In addition, where a merchant is already approved, Ukash may suspend or withhold their service from merchants if they no longer meet the criteria required, as may be determined from time to time. P a g e 2 V1.4

The Ukash Service will not approve a merchant if: 1. The website or activity undertaken will be deemed oriented to any sensitive and negative subjects such as politics, religion, promoting hate or illegal activities. 2. The merchant has not provided all the information required for KYC (Know Your Customer) purposes to the complete satisfaction of Ukash. 3. All rights, licenses, permits and authorisations necessary to enable the merchant to operate the business and comply with all relevant laws and regulations are not obtained. For gaming merchants this will include a valid gambling licence issued by a recognised authority. All companies will need to submit a copy of the Certificate of Incorporation as a minimum. 4. There is significant derogatory background information about the merchant and/or any person, body or organisation associated directly or indirectly with the merchant. This will include directors, employees, partners, principals and shareholders. Ukash has the right to request any information in this regard from the appropriate sources including using credit reports, trade and bank references, criminal records, PEP, OFAC and other sanction data bases, personal and business financial statements and tax returns. 5. A valid URL address is not linked to a working website or will not exist prior to the merchant being activated. The URL must link directly to web pages that contain information about the merchant s service or products. Links that redirect through or to domains other than the one specified in the Ukash merchant account settings will not be accepted. 6. Ukash is not given full and unfettered access to the merchant s web site at any time as reasonably determined by Ukash. 7. In the sole opinion of Ukash, false, confusing or misleading statements are made directly or indirectly by the merchant or if there is a failure to disclose a material fact about their programs, products or services, or any aspect thereof. 8. The procedures and controls required by Ukash, including Anti Money Laundering and Anti-Terrorist Funding controls, are not implemented. P a g e 3 V1.4

Monitoring and Compliance The Ukash Operations Department will, on an ad-hoc basis, review live merchants to monitor compliance with the above guidelines. Ukash will suspend or terminate a non-complying merchant, subject to the terms of the merchant s contract. A Merchant must not be involved or associated with any activities or materials which may infringe, dilute, denigrate, or impair the goodwill and/or reputation of the Ukash brand. Ukash will not under any circumstances knowingly approve Merchants associated directly or indirectly with the following products or services: a. Terrorism, Racism and Violence: products and associated websites which in any way promote violence or advocate violence against a target group. A target group is distinguished by its race or ethnic origin, colour, national origin, religion, disability, sex, age, veteran status or sexual orientation/gender identity. b. Body parts: promotion, sale or dealings of nature in body parts or human remains or the non-consensual mutilation of a person or body part. c. Copyright unlocking devices: mod chips or other devices designed to circumvent copyright protection. d. Abusing copyright or counterfeit goods: All products and services presented by merchants must respect copyright and trademark law. Unauthorised or "bootleg" copies of media, software, or other licensed or protected material will not be acceptable. In addition, products that are replicas or imitations of designer goods; products without a celebrity endorsement that would normally require such an association, fake autographs, counterfeit stamps, and other potentially unauthorized goods will also fall into this category. e. Drugs, drug paraphernalia, and drug test circumvention aids: promotion of illegal drugs and drug accessories, including herbal drugs such as salvia and magic mushrooms and drug test circumvention aids and products such as drug cleansing shakes and urine test additives. f. Illegal goods and services: materials, products, or information promoting illegal goods or enabling illegal acts e.g. illegal knives or other illegal weapons. Other examples included in this category are manuals, how-to guides, information or equipment enabling illegal access to software, servers, websites, or other protected property and products that descramble cable and satellite signals in order to obtain free service. g. False representation: fake IDs, passports, diplomas, and noble titles. P a g e 4 V1.4

Monitoring and Compliance - continued h. Personal Information: content that includes contact or personal information about another individual without their permission. i. Adult Merchants associated directly or indirectly in either the URL or the homepage to child pornography and under age sex, bestiality, incest, rape, brutality, forced sex, prostitution or escort services j. Pyramid Schemes are unacceptable but legitimate Multi-level Marketing businesses will be acceptable. k. Schemes that allow a customer to transfer or withdraw an account balance from any financial product, which has been loaded with Ukash vouchers, directly into cash without the full verification of the customer s identity. l. IP anonymisers or private VPNs or any similar service which has the intention of hiding the true identity of a computer or device. m. Schemes that facilitate the buying, selling or exchanging of Ukash from or into any unauthorised and/or unregulated e-money product, or any other unregulated financial product where these products are subject to regulation n. Schemes that do not fully verify the identity of all parties involved and do not allow Ukash full visibility and access to information relating to the entire transaction associated with a Ukash voucher. o Schemes that facilitate the buying, selling or exchanging of Ukash from or into any virtual or crypto currencies which are not regulated Ukash The Counting House 53 Tooley Street London SE1 2QN www.ukashbusiness.com P a g e 5 V1.4