D A T A S E C U R I T Y, F R A U D P R E V E N T I O N A N D P C I C O M P L I A N C E. May 2015

Size: px
Start display at page:

Download "D A T A S E C U R I T Y, F R A U D P R E V E N T I O N A N D P C I C O M P L I A N C E. May 2015"

Transcription

1 D A T A S E C U R I T Y, F R A U D P R E V E N T I O N A N D P C I C O M P L I A N C E May 2015

2 D A T A S E C U R I T Y, F R A U D P R E V E N T I O N A N D P C I C O M P L I A N C E This presentation was prepared exclusively for the benefit and internal use of the J.P. Morgan client or potential client to whom it is directly delivered and/or addressed (including subsidiaries and affiliates, the Company ) in order to assist the Company in evaluating, on a preliminary basis, the feasibility of a possible transaction or transactions or other business relationship and does not carry any right of publication or disclosure, in whole or in part, to any other party. This presentation is for discussion purposes only and is incomplete without reference to, and should be viewed solely in conjunction with, the oral briefing provided by J.P. Morgan. Neither this presentation nor any of its contents may be disclosed or used for any other purpose without the prior written consent of J.P. Morgan. To the extent that the information in this presentation is based upon any management forecasts or other information supplied to us by or on behalf of the Company, it reflects such information as well as prevailing conditions and our views as of this date, all of which are accordingly subject to change. J.P. Morgan s opinions and estimates constitute J.P. Morgan s judgment and should be regarded as indicative, preliminary and for illustrative purposes only. In preparing this presentation, we have relied upon and assumed, without independent verification, the accuracy and completeness of all information available from public sources or which was provided to us by or on behalf of the Company or which was otherwise reviewed by us. J.P. Morgan makes no representations as to the actual value which may be received in connection with neither a transaction nor the legal, tax or accounting effects of consummating a transaction. Unless expressly contemplated hereby, the information in this presentation does not take into account the effects of a possible transaction or transactions involving an actual or potential change of control, which may have significant valuation and other effects. Notwithstanding anything herein to the contrary, the Company and each of its employees, representatives or other agents may disclose to any and all persons, without limitation of any kind, the U.S. federal and state income tax treatment and the U.S. federal and state income tax structure (if applicable) of the transactions contemplated hereby and all materials of any kind (including opinions or other tax analyses) that are provided to the Company insofar as such treatment and/or structure relates to a U.S. federal or state income tax strategy provided to the Company by J.P. Morgan. J.P. Morgan's policies on data privacy can be found at IRS Circular 230 Disclosure: JPMorgan Chase & Co. and its affiliates do not provide tax advice. Accordingly, any discussion of U.S. tax matters included herein (including any attachments) is not intended or written to be used, and cannot be used, in connection with the promotion, marketing or recommendation by anyone not affiliated with JPMorgan Chase & Co. of any of the matters addressed herein or for the purpose of avoiding U.S. taxrelated penalties. Chase, J.P. Morgan and JPMorgan Chase are marketing names for certain businesses of JPMorgan Chase & Co. and its subsidiaries worldwide (collectively, JPMC ) and if and as used herein may include as applicable employees or officers of any or all of such entities irrespective of the marketing name used. Products and services may be provided by commercial bank affiliates, securities affiliates or other JPMC affiliates or entities. In particular, securities brokerage services other than those which can be provided by commercial bank affiliates under applicable law will be provided by registered broker/dealer affiliates such as J.P. Morgan Securities LLC, J.P. Morgan Institutional Investments Inc. or by such other affiliates as may be appropriate to provide such services under applicable law. Such securities are not deposits or other obligations of any such commercial bank, are not guaranteed by any such commercial bank and are not insured by the Federal Deposit Insurance Corporation. This presentation is delivered to you for the purpose of providing you information regarding certain of J.P. Morgan's products or services as described herein. Note that J.P. Morgan may not be able to provide all of the products or services described herein or requested by you unless J.P. Morgan confirms that such requested products or services would not cause J.P. Morgan to be considered a "Municipal Advisor" under Section 15B of the Securities and Exchange Act of 1934, as amended, and the related final rules (the "Municipal Advisor Rules"), or are otherwise excluded or exempt under the Municipal Advisor Rules. J.P. Morgan is not recommending that you take action or refrain from taking action or providing any advice and is not and will not be acting as your advisor, agent or fiduciary with respect to any such products or services. Any portion of this presentation which provides information on municipal financial products or the issuance of municipal securities is given in response to your questions or to demonstrate our general experience or capabilities and is not intended to constitute advice within the meaning of the Municipal Advisor Rules. You should consult with your own financial, legal and other advisors to the extent you deem appropriate in connection with the information provided herein. This presentation does not constitute a commitment by any JPMC entity to extend or arrange credit or to provide any other services.

3 D A T A S E C U R I T Y, F R A U D P R E V E N T I O N A N D P C I C O M P L I A N C E Agenda Page PCI Compliance and Data Security 1 Data Security Solutions 7 Fraud Prevention 13 1

4 P C I C O M P L I A N C E A N D D A T A S E C U R I T Y Threats outpacing most organizations 9X The number of cyber attacks in the U.S. has increased ninefold in the last six years In 2013, there were an estimated 58.4 million unique new strains of malware deployed breaches reported in 2013; an increase of 31% from ,860,240 Records that were breached in 4,214 data breaches between 2005 and % Percentage of companies NOT fully compliant with all 12 PCI standard requirements in Sources: 1 Redwood Capital Market Analysis Feb Aite Group, Cyberthreats: Multiplying Like Tribbles, October ITRC Breach Report Privacy Rights Clearinghouse 5 Verizon 2014 PCI Compliance Report 2

5 P C I C O M P L I A N C E A N D D A T A S E C U R I T Y PCI in brief Data security standards created and maintained by the Payment Card Industry Security Standards Council (PCI SSC) Applies to any system that stores, processes or transmits card data 12 requirements addressing operational and technical areas Specific technology guidelines for encryption and tokenization Organizations often need to combine multiple technologies to secure data and meet PCI requirements 3

6 P C I C O M P L I A N C E A N D D A T A S E C U R I T Y The prioritized approach Six milestones 1. If you don t need it, don t store it 2. Secure the perimeter 3. Secure applications 4. Monitor and control access to your systems 5. Protect stored cardholder data 6. Finalize remaining compliance efforts, and ensure all controls are in place Tools and guidance on the PCI SSC Web site 4

7 P C I C O M P L I A N C E A N D D A T A S E C U R I T Y Why NOT compliance? New compliance mandates are potentially endless Government regulation Industry standards Organization policies Achieving compliance is easier than maintaining compliance Becoming compliant is a project Maintaining compliance is a culture change Why information security A single, comprehensive set of enterprise information security polices, standards, baselines, and procedures Simplifies culture change Simplifies compliance mandate responses by Cataloging existing controls Speeding gap analysis Limiting expense and churn caused by new mandates Reduces compliance to a single core competency: Security 5

8 P C I C O M P L I A N C E A N D D A T A S E C U R I T Y Security is a business decision Steps to take Assess the risks Identify the mitigation options Determine how much risk The organization is comfortable accepting The organization is ALLOWED to accept Recognize the constraints Acquire and apply resources IT and information security can then Consolidate data and systems Segment the network Implement the controls Close the gaps 6

9 D A T A S E C U R I T Y, F R A U D P R E V E N T I O N A N D P C I C O M P L I A N C E Agenda Page PCI Compliance and Data Security 1 Data Security Solutions 7 Fraud Prevention 13 7

10 D A T A S E C U R I T Y S O L U T I O N S Security is Comprehensive A viable security solution to combat today s threats requires a comprehensive combination of security solutions Replaces customer payment data with a benign value that cannot be converted back to card or account information within a merchant s network, protecting that data from security threats. Tokenization EMV Advanced chip card technology that helps prevent skimming, counterfeit and lost/stolen fraud. Encryption PCI DSS Encryption technology that protects the primary account number of a payment card from moment of capture at retail point of sale Fraud Tools A combination of preventative, detective, responsive controls applied to a merchant s process, people, and technologies. Tools that provide greater visibility into sophisticated fraud patterns, advanced capabilities include proxy piercing and geolocation, which can pinpoint a transaction s origin in real time, and dynamic order linking 8

11 D A T A S E C U R I T Y S O L U T I O N S Encryption 101 What is Encryption? Encryption is a security measure that leverages a cipher algorithm to mathematically transform sensitive data in such a way that only authorized parties can read it Encryption does not prevent interception of data, but rather the access to the content intercepted From the initial swipe, dip, tap, or click, card data can be encrypted to protect the data throughout the payment transmission process How Does it Work? Recipient's Public Key Recipient's Private Key Source: PacketLife.net Why is Encryption Important? Ideal for Data on the Go: Encryption is particularly useful in secure transmission of sensitive information Open Model with Limited Risk Exposure: Encryption leverages a public and private key model, where a public key is widely available to encrypt messages while a private key is only available to the receiving party for decryption of the message 9

12 D A T A S E C U R I T Y S O L U T I O N S Tokenization 101 What is Tokenization? Tokenization is the process through which real account data is replaced with a proxy value known as a token These tokens can either be static (never changing) or dynamic (different for each transaction) Some tokens are format-preserving (i.e., they look like regular PANs), while others can be different lengths or alphanumeric in context Tokens were created to minimize risk for merchants who stored live payment account credentials on their servers, but have expanded to minimize risks for issuers, brands, acquirers, and consumers Think of Tokens like Casino Chips You trade cash for chips Cash is valuable in a large context and is easily used Chips are valuable only in a limited context (inside the casino) and can only be used to do certain things defined by the house (e.g. play on certain table games) Why is Tokenization Important? Renders Previously High Value Data Almost Useless: Cash is higher risk because it can be stolen and used anywhere, while a chip is lower risk because even if it s stolen, it can t be used everywhere Consolidates Risk to a Single Control Point: Tokenization is like going to the cashier and giving cash and receiving tokens and De-Tokenization is like going back to the cashier and trading chips for cash 10

13 D A T A S E C U R I T Y S O L U T I O N S Hosted Pay Page for Ecommerce A consumer-facing hosted page that captures customer payment data in a PCI compliant manner Creating a secure and seamless payment experience for your customers while keeping your organization compliant Benefits Increases the security of your customers payment data Reduces the cost and scope of PCI compliance Your Website Ecommerce Platform Enables you to maintain complete control of your branding throughout the payment cycle Hosted Pay Page Minimizes initial and ongoing IT resource impacts How it works A Hosted Pay Page can clone your payment page so you maintain complete control of the look and feel of your customers checkout experience. There are no static templates to update. Payment Page Success Page CLONE¹ Payment Page Token Payment brands for approval There is no need to use an acquirer-branded payment page. You can change your payment page elements at any time, and Hosted Pay Page will capture the changes in real time. You are in control of your brand on the payment page at all times. Your bank account 11

14 D A T A S E C U R I T Y S O L U T I O N S Page encryption What does it do for your organization? Encrypts PAN and CVV data within a customer s browser Provides you with full payment page control; no re-directs Remains invisible to the customer Delivers an effective PCI solution Offers a host-based alternative to a Hosted Pay Page 12

15 D A T A S E C U R I T Y, F R A U D P R E V E N T I O N A N D P C I C O M P L I A N C E Agenda Page PCI Compliance and Data Security 1 Data Security Solutions 7 Fraud Prevention 13 13

16 F R A U D P R E V E N T I O N EMV The Basics How EMV Chip Cards are Different Chip cards are inserted into chip-reading devices rather than being swiped If PIN is supported on the chip card, it will replace traditional signature In conjunction with PIN, chip cards provide an added layer of authentication Terminals will accept both magnetic stripe and chip cards for years to come Customer Verification Methods (CVM) Chip and Signature Chip and Offline PIN Chip and Online PIN The consumer signs to validate their identity Prevents counterfeit card fraud The chip card and the terminal validate the PIN, then authorize Prevents counterfeit, stolen and never received or issued card fraud The consumer s PIN is sent to the host for validation Prevents counterfeit, stolen and never received or issued card fraud Source: EMVCo Q statistics 14

17 F R A U D P R E V E N T I O N Key points about EMV in the US Benefits of chip technology Confidence EMV has been used globally with cards in Europe for over a decade; and in Canada over the last seven years Security and Fraud Protection dynamic authentication reduces the value of stolen cardholder data; Chip technology is more difficult to duplicate and combining its use with a PIN helps reduce fraud due to lost, stolen or counterfeit cards Reduces Chargebacks the use of PIN with the chip technology can significantly reduce the frequency of chargebacks Global Interoperability and Consistency outside of the U.S., 43.3% of all cards are EMV and 86.8% of terminals are EMV capable US migration drivers Avoid becoming a destination for criminals and global magnetic-stripe fraud activity Increase satisfaction of traveling international cardholders Maintain interoperability with the rest of the world Position the industry for the adoption of other forms of payment, notably NFC mobile contactless payments Payment brand mandates and chargeback liability shifts are forcing the adoption of this technology What is a liability shift? Liability Shift is a change in who bears the chargeback related cost of fraudulent transactions The penalty for merchants or issuers missing the October 2015 (non Petro) / October 2017 (Petro) deadline is a shift in fraud related liability. Merchants who have not implemented an EMV certified solution will risk absorbing the cost of all disputed counterfeit and potentially lost/stolen/not received fraudulent transactions they initiate. 15

18 F R A U D P R E V E N T I O N EMV in the US: Key Merchant Considerations Keys to EMV Readiness 1. The Right Integration: Direct, Middleware/Third Party (TP) Gateway, Semi-Integrated, or Stand-Alone approach 2. Merchant Readiness: Processes, Procedures, Learning / Development on handling EMV transactions 3. Consumer Readiness: Building Awareness and Understanding of EMV Make The Most of EMV Migration 1. Consider POS modernization holistically PIN Acceptance, E2E Encryption, Tokenization, Contactless, High-Speed IP Connectivity 2. Be prepared for Fraud Increases in Card Not Present (CNP) channels EMV adoption has historically shifted Card Present Fraud to CNP and cross-border Fraud Omni-channel and CNP merchants should prepare by evaluating fraud detection technology AVS/CVV alone is not enough as false positive exposure can be high. Include other fraud detection technology such as Velocity Checks, Positive and Negative Lists, Proxy Piercing/IP Geolocation, and Dynamic Risk Scoring 16

19 F R A U D P R E V E N T I O N Key takeaways PCI Basic security measures but not all that is needed Data protection Any time the card data is exposed, in transit or at rest, it is at risk Layered protection is the only answer Different from data protection Fraud management More risk in CNP space than card present Geolocation, proxy piercing, device fingerprinting 17

20 F R A U D P R E V E N T I O N Speaker contact information Matthew Leman Public Sector Market Manager Chase Paymentech O: Matt.Leman@chasepaymentech.com 18

21 F R A U D P R E V E N T I O N This presentation is delivered to you for the purpose of providing you information regarding certain of J.P. Morgan's products or services as described herein. Note that J.P. Morgan may not be able to provide all of the products or services described herein or requested by you unless J.P. Morgan confirms that such requested products or services would not cause J.P. Morgan to be considered a "Municipal Advisor" under Section 15B of the Securities and Exchange Act of 1934, as amended, and the related final rules (the "Municipal Advisor Rules"), or are otherwise excluded or exempt under the Municipal Advisor Rules. J.P. Morgan is not recommending that you take action or refrain from taking action or providing any advice and is not and will not be acting as your advisor, agent or fiduciary with respect to any such products or services. Any portion of this presentation which provides information on municipal financial products or the issuance of municipal securities is given in response to your questions or to demonstrate our general experience or capabilities and is not intended to constitute advice within the meaning of the Municipal Advisor Rules. You should consult with your own financial, legal and other advisors to the extent you deem appropriate in connection with the information provided herein. 19

Shock to the System:

Shock to the System: Shock to the System: The New Normal for ecommerce After Data Breaches September 22, 2015 Bill Cohn Director of Product Management, ecommerce Vantiv What We ll Cover Impact of Data Breaches The New Normal

More information

protect fraudulent against transactions your business Introduction What is a fraudulent transaction? Merchant Responsibilities Card Present

protect fraudulent against transactions your business Introduction What is a fraudulent transaction? Merchant Responsibilities Card Present protect your business against fraudulent transactions Reg. No. 1929/001225/06. Introduction There is a real possibility that your business could be a victim of fraudulent card transactions given the sophistication

More information

RentWorks Version 4 Credit Card Processing (CCPRO) User Guide

RentWorks Version 4 Credit Card Processing (CCPRO) User Guide RentWorks Version 4 Credit Card Processing (CCPRO) User Guide Table of Contents Overview... 2 Retail Processing Method... 3 Auto Rental Method... 4 How to Run a Draft Capture... 5 Draft Capture Failures.....6

More information

EMV Chargeback Best Practices

EMV Chargeback Best Practices EMV Chargeback Best Practices Version 1.1 Date: April 2017 U.S. Payments Forum 2017 Page 1 About the U.S. Payments Forum The U.S. Payments Forum, formerly the EMV Migration Forum, is a cross-industry body

More information

A report showing the merchant s settlement. The acquirer settlement report is generated by the acquiring bank at the end of every billing cycle.

A report showing the merchant s settlement. The acquirer settlement report is generated by the acquiring bank at the end of every billing cycle. A Acquirer (acquiring bank) An acquirer is an organisation that is licensed as a member of Visa/MasterCard as an affiliated bank and processes credit card transactions for (online) businesses. Acquirers

More information

Table of Contents. Overview. What is payment processing? Who s Who. Types of Payment Solutions. Online Transactions. Interchange Process

Table of Contents. Overview. What is payment processing? Who s Who. Types of Payment Solutions. Online Transactions. Interchange Process Overview Credit Card Processing 101 is your go-to handbook for navigating the payments industry. This document provides a quick and thorough understanding on how businesses accept electronic payments,

More information

Innovation and Disruption in Payments

Innovation and Disruption in Payments Innovation and Disruption in Payments Shaun Abraham, Director of Client Solutions, Chase Paymentech September 16, 2014 4:20 p.m. ET This presentation was prepared exclusively for the benefit and internal

More information

Security Rules and Procedures Merchant Edition

Security Rules and Procedures Merchant Edition Security Rules and Procedures Merchant Edition 14 September 2017 SPME Contents Contents Chapter 1: Customer Obligations... 7 1.1 Compliance with the Standards...8 1.2 Conflict with Law...8 1.3 The Security

More information

Payment Card Industry Training 2014

Payment Card Industry Training 2014 Payment Card Industry Training 2014 Phone Line Terminal & Hosted Order Page/Secure Acceptance Redirect Merchants Contact * Carole Fallon * 614-292-7792 * fallon.82@osu.edu Updated May 2014 AGENDA A. Payment

More information

ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE

ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE Purpose This document explains the benefits of using Risk Based Authentication (RBA) a dynamic method of cardholder authentication

More information

Ball State University

Ball State University PCI Data Security Awareness Training Agenda What is PCI-DSS PCI-DDS Standards Training Definitions Compliance 6 Goals 12 Security Requirements Card Identification Basic Rules to Follow Myths 1 What is

More information

Tim Hopkins, Senior Business Leader Dispute Resolution Management. The Ever Changing Fraud Chargeback

Tim Hopkins, Senior Business Leader Dispute Resolution Management. The Ever Changing Fraud Chargeback Tim Hopkins, Senior Business Leader Dispute Resolution Management The Ever Changing Fraud Chargeback #GlobalRisk @ MasterCardNews The Fraud Chargeback in the 70s Country Club Billing was the norm in the

More information

State of Card Fraud: 2018

State of Card Fraud: 2018 State of Card Fraud: 2018 A deep dive into the evolution of card fraud + industry benchmark data for financial institutions. Stopping Fraud at the Speed of Data Continuing the trend of prior years, the

More information

PCI Training. If your department processes credit card information, it is CRITICAL that you understand the importance of protecting this data.

PCI Training. If your department processes credit card information, it is CRITICAL that you understand the importance of protecting this data. PCI Training This training is to assist you in understanding the policies at Appalachian that govern credit card transactions and to meet the PCI DSS Standards for staff training to prevent identity theft.

More information

Global Visa Card-Not-Present Merchant Guide to Greater Fraud Control. Protect Your Business and Your Customers with Visa s Layers of Security

Global Visa Card-Not-Present Merchant Guide to Greater Fraud Control. Protect Your Business and Your Customers with Visa s Layers of Security Global Visa Card-Not-Present Merchant Guide to Greater Fraud Control Protect Your Business and Your Customers with Visa s Layers of Security Millions of Visa cardholders worldwide make one or more purchases

More information

Focused on card fraud prevention

Focused on card fraud prevention Focused on card fraud prevention The evolution of credit card fraud As EMV adoption increases, counterfeit cards are harder to create and use 76% decrease in counterfeit fraud at U.S. chip-enabled merchants*

More information

MERCHANT MEMBER PACKAGE AGREEMENT & APPLICATION

MERCHANT MEMBER PACKAGE AGREEMENT & APPLICATION MERCHANT MEMBER PACKAGE AGREEMENT & APPLICATION Vantage Card Services, Inc. 2230 Towne Lake Parkway Building 400, Suite 110 Woodstock, GA 30189 (800) 397-2380 (770) 928-5688 Fax (770) 928-9328 www.vantagecard.com

More information

A to Z Jargon buster. Call +44 (0) to discuss your upgrade options

A to Z Jargon buster. Call +44 (0) to discuss your upgrade options A to Z Jargon buster Call +44 (0) 844 209 4370 to discuss your upgrade options www.pxp-solutions.com sales@pxp-solutions.com twitter: @pxpsolutions Are you trying to navigate your way around what can seem

More information

Administration and Department Credit Card Policy

Administration and Department Credit Card Policy Administration and Department Credit Card Policy Updated February 29, 2016 CONTENTS Purpose PCI DSS Scope/Applicability Authority Securing Credit Card Data Policy Glossary Page 2 of 5 PURPOSE As a department

More information

What is PCI Compliance?

What is PCI Compliance? What is PCI Compliance? The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that ALL companies that accept, process, store or transmit credit card

More information

Handling Debit Card Chargebacks

Handling Debit Card Chargebacks Handling Debit Card Chargebacks Rules, Rights and Best Practices Diana Kern, AAP Senior Trainer Disclaimer: The following does not constitute legal advice. The information provided herein may not be applicable

More information

PAI Secure Program Guide

PAI Secure Program Guide PAI Secure Program Guide A complete guide to understanding the Payment Card Industry Data Security Requirements (PCI DSS) and utilizing the PAI Secure Program Welcome to PAI Secure, a unique 4-step PCI-DSS

More information

American Express Data Security Operating Policy Thailand

American Express Data Security Operating Policy Thailand American Express Data Security Operating Policy Thailand As a leader in consumer protection, American Express has a long-standing commitment to protect Cardmember Information, ensuring that it is kept

More information

VPSS Certification Frequently Asked Questions

VPSS Certification Frequently Asked Questions VPSS Certification Frequently Asked Questions What is the difference between Visa s Account Information Security (AIS) program and VPSS Certification? The AIS program ensures compliance to the Payment

More information

Strong Customer Authentication and PSD2

Strong Customer Authentication and PSD2 Strong Customer Authentication and PSD2 How to adapt to new regulation in Europe January 18, 2018 Authors: Christoph Baert Paul Baker 1. INTRODUCTION 3 2. WHAT IS MASTERCARD S AUTHENTICATION STRATEGY IN

More information

Payments POCKET GUIDE. in Your Pocket

Payments POCKET GUIDE. in Your Pocket Payments POCKET GUIDE in Your Pocket 1 Definitions 3D Secure An XML-based protocol that is designed to add an extra layer of security for online credit and debit card transactions. It has been adopted

More information

UPCOMING PAYMENT SCHEMES RULES CHANGES

UPCOMING PAYMENT SCHEMES RULES CHANGES UPCOMING PAYMENT SCHEMES RULES CHANGES Sara Novakovič, Dispute Operations Department Koper, June 2017 CONTENT 1 Payment schemes groups and chargeback reason codes 2 MasterCard rules changes 3 Visa rules

More information

Card Acceptance Guidelines for Visa Merchants

Card Acceptance Guidelines for Visa Merchants Card Acceptance Guidelines for Visa Merchants Table of Contents Introduction...1 SECTION 1: Getting Down to Basics... 4 Visa Transaction Processing Who is Involved?.....................................................

More information

Protect your business.

Protect your business. Protect your business. Partner with us to combat fraud and safeguard your business. Important tools Safeguard your business from fraudulent activity In this brochure you will find important information

More information

Card Acceptance Guidelines for Visa Merchants

Card Acceptance Guidelines for Visa Merchants Card Acceptance Guidelines for Visa Merchants Table of Contents Introduction........................................................................................ 1 SECTION 1: Getting Down to Basics................................................................

More information

Your Guide to. Credit Card Skimming: How to Spot and Avoid Fraudulent Charges

Your Guide to. Credit Card Skimming: How to Spot and Avoid Fraudulent Charges Your Guide to Credit Card Skimming: How to Spot and Avoid Fraudulent Charges The term skimming, as applied to credit cards, involves stealing card account data during a legitimate transaction. It is then

More information

PCI security standards: A high-level overview

PCI security standards: A high-level overview PCI security standards: A high-level overview Prepared by: Joel Dubin, Manager, RSM US LLP joel.dubin@rsmus.com, +1 312 634 3422 Many merchants often have difficulty understanding how they must comply

More information

Transforming the State and Local Government Payment Process

Transforming the State and Local Government Payment Process Transforming the State and Local Government Payment Process MARKET TRENDS REPORT Introduction Modern citizens routinely receive modern services from the private sector, and payment processing is no exception.

More information

Dual Interface Test Card Set Summary

Dual Interface Test Card Set Summary Dual Interface Test Card Set Summary August, 2016 Powered by Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available

More information

minimise card fraud in your business.

minimise card fraud in your business. minimise card fraud in your business. First National Bank Tanzania Limited - a subsidiary of FirstRand Limited. A Registered Commercial Bank in Tanzania (CBA00050). There is a real possibility that your

More information

S T R I C T L Y P R I V A T E A N D C O N F I D E N T I A L Agenda PRAGUE CONFERENCE ROAD TO COPENHAGEN CONTENTS. Page

S T R I C T L Y P R I V A T E A N D C O N F I D E N T I A L Agenda PRAGUE CONFERENCE ROAD TO COPENHAGEN CONTENTS. Page S T R I C T L Y P R I V A T E A N D C O N F I D E N T I A L Richard Folland Senior Climate Change and Energy Adviser JPMorgan ROAD TO COPENHAGEN PRAGUE, 23 SEPTEMBER Agenda CONTENTS JPMorgan Environmental

More information

Payment Fraud Statistics

Payment Fraud Statistics Payment Fraud Statistics - Summary of Results Fraud Perpetrated on Australian Cheques and Cards Fraud Transactions Total Transactions Fraud Rates number $ number (millions) $ (millions) as % of total no.

More information

CARD ISSUER DUTIES & RESPONSIBILITIES. Copyright 2013 CO-OP Financial Services

CARD ISSUER DUTIES & RESPONSIBILITIES. Copyright 2013 CO-OP Financial Services SECTION 3 Operating Rules and Regulations without the prior written permission of CO-OP Financial Services. All Rights Reserved Card Issuers shall have the following responsibilities in addition to those

More information

Chargebacks 101. Do draft retrievals result in upfront debits? No, draft retrievals are non-monetary.

Chargebacks 101. Do draft retrievals result in upfront debits? No, draft retrievals are non-monetary. Chargebacks 101 Can a telephone recording of a conversation with the cardholder be accepted as evidence that the cardholder no longer disputes? Unfortunately, the networks are not able to accept telephone

More information

Payment Fraud Statistics

Payment Fraud Statistics Payment Fraud Statistics - Summary of Results Fraud Perpetrated on Australian Cheques and Cards 1 July 2015-30 June 2016 (Revised April 2017) Fraud Transactions Total Transactions Fraud Rates number $

More information

Chargeback Management Guidelines for Visa Merchants

Chargeback Management Guidelines for Visa Merchants Chargeback Management Guidelines for Visa Merchants Table of Contents Introduction.............................................................. 1 Section 1: Getting Down to Basics..........................................

More information

Subject: Protecting cardholder data in support of the Payment Card Industry (PCI) Data Security Standards

Subject: Protecting cardholder data in support of the Payment Card Industry (PCI) Data Security Standards University Policy: Cardholder Data Security Policy Category: Financial Services Subject: Protecting cardholder data in support of the Payment Card Industry (PCI) Data Security Standards Office Responsible

More information

AN 1213 Revised Standards Signature Requirements

AN 1213 Revised Standards Signature Requirements AN 1213 Revised Standards Signature Requirements Generated on 18 October 2017 Published On 18 October 2017 This PDF was created from content on the Mastercard Technical Resource Center, which is updated

More information

Corporate, Purchasing and Dynamic Card Funding Visa Cards Terms and Conditions

Corporate, Purchasing and Dynamic Card Funding Visa Cards Terms and Conditions Corporate, Purchasing and Dynamic Card Funding Visa Cards Terms and Conditions 23 March 2018 2 Contents Page 1 Scope 2 2 Cards And Their Use 3 3 Bill Payments (For Corporate Cards And Purchasing Cards

More information

Payment Card Security Policy

Payment Card Security Policy Responsible University Administrator: Vice President for Finance and Administration Responsible Officer: Director of Student Financial Services Origination : 4/1/2016 Current Revision : N/A Next Review

More information

Subject: Protecting cardholder data in support of the Payment Card Industry (PCI) Data Security Standards

Subject: Protecting cardholder data in support of the Payment Card Industry (PCI) Data Security Standards University Policy: Cardholder Data Security Policy Category: Financial Services Subject: Protecting cardholder data in support of the Payment Card Industry (PCI) Data Security Standards Office Responsible

More information

Exactly what kind of bank is South State Bank?

Exactly what kind of bank is South State Bank? Business Banking Exactly what kind of bank is South State Bank? Yours. The right banking relationship can make a big difference in your success. Whether you need a new business checking account, more effective

More information

IDT FINANCIAL SERVICES PREPAID CARD CONDITIONS XXIMO MOBILITY CARD PROGRAMME THE NETHERLANDS

IDT FINANCIAL SERVICES PREPAID CARD CONDITIONS XXIMO MOBILITY CARD PROGRAMME THE NETHERLANDS IDT FINANCIAL SERVICES PREPAID CARD CONDITIONS XXIMO MOBILITY CARD PROGRAMME THE NETHERLANDS Card Conditions These Card Conditions apply to the use of the IDTFS Prepaid Cards by the Customer and all natural

More information

1.4 Cardholder means an individual who activates, receives and/or uses the Card.

1.4 Cardholder means an individual who activates, receives and/or uses the Card. The following terms and conditions govern your use of the MasterCard Prepaid Card. By signing or using the MasterCard Prepaid Card, you are agreeing to these terms and conditions. 1 DEFINITIONS 1.1 The

More information

XXImo Program Card Conditions

XXImo Program Card Conditions IDT FINANCIAL SERVICES PREPAID CARD CONDITIONS XXIMO MOBILITY CARD PROGRAMME BELGIUM Card Conditions These Card Conditions apply to the use of the IDTFS Prepaid Cards by the Customer and all natural or

More information

PRIVACY AND CYBER SECURITY

PRIVACY AND CYBER SECURITY PRIVACY AND CYBER SECURITY Presented by: Joe Marra, Senior Account Executive/Producer Stoya Corcoran, Assistant Vice President Presented to: CIFFA Members September 20, 2017 1 Disclaimer The information

More information

Credit Card Handling Security Standards

Credit Card Handling Security Standards Credit Card Handling Security Standards Overview This document is intended to provide guidance regarding the processing of charges and credits on credit and/or debit cards. These standards are intended

More information

Reconsidering Key Entry and Voice Authorizations

Reconsidering Key Entry and Voice Authorizations Reconsidering Key Entry and Voice Authorizations Katie McSparron, Leader Enterprise Relationships, Vantiv Eric Cofer, Leader Enterprise Relationships, Vantiv Thursday, February 16 th 3:45-4:30PM Learning

More information

Payments 101. An Overview the US Payment Networks. René M Pelegero, President, Retail Payments Global Consulting Group

Payments 101. An Overview the US Payment Networks. René M Pelegero, President, Retail Payments Global Consulting Group Payments 101 An Overview the US Payment Networks René M Pelegero, President, Retail Payments Global Consulting Group A Payment is an Exchange of Value Value Financial Non Financial In Financial Institutions

More information

RETAIL SPECIFIC NEWS Keeping you in the know

RETAIL SPECIFIC NEWS Keeping you in the know Autumn 2014 EDITION RETAIL SPECIFIC NEWS Keeping you in the know Important Information -- Please keep in in a safe place This Edition of Retail Specific Card Scheme Updates Tel: 0845 702 3344 Card Scheme

More information

France - Domestic Interchange Fees

France - Domestic Interchange Fees France Domestic Interchange Fees Consumer Card Interchange Fees Payment Product Fee Tier General MasterCard Consumer Credit Low Value Payments (1) Contactless Terminal (1) Contactless Terminal High Value

More information

Year-end 2016 fraud update: Payment cards, remote banking and cheque

Year-end 2016 fraud update: Payment cards, remote banking and cheque Year-end 2016 update: Payment cards, remote banking and cheque 30 March 2017 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments

More information

Secure Payment Transactions based on the Public Bankcard Ledger! Author: Sead Muftic BIX System Corporation

Secure Payment Transactions based on the Public Bankcard Ledger! Author: Sead Muftic BIX System Corporation Secure Payment Transactions based on the Public Bankcard Ledger! Author: Sead Muftic BIX System Corporation sead.muftic@bixsystem.com USPTO Patent Application No: 15/180,014 Submission date: June 11, 2016!

More information

Payment Processing 101

Payment Processing 101 Payment Processing 101 Timelines & Deliverables PRESENTED BY Pg: 1 March 7, 2018 www.clearwaterpayments.com Quick Agenda Credit/Debit Transactions Industry Definitions Transaction Process Cost/Pricing

More information

CARD FRAUD BOOKLET Protect your card and information at all times PAGE: 1 // 42

CARD FRAUD BOOKLET Protect your card and information at all times PAGE: 1 // 42 PAGE: 1 // 42 www.sabric.co.za CARD FRAUD BOOKLET Protect your card and information at all times Table of Contents Executive Summary 05 21 Card Fraud in the UK Qualification of Information Payments Association

More information

T H E R A P I D P A C E O F C H A N G E I N T H E P A Y M E N T S L A N D S C A P E

T H E R A P I D P A C E O F C H A N G E I N T H E P A Y M E N T S L A N D S C A P E S T R I C T L Y P R I V A T E A N D C O N F I D E N T I A L T H E R A P I D P A C E O F C H A N G E I N T H E P A Y M E N T S L A N D S C A P E October 2014 T H E R A P I D P A C E O F C H A N G E I N

More information

CREDIT CARD PROCESSING AND SECURITY

CREDIT CARD PROCESSING AND SECURITY CREDIT CARD PROCESSING AND SECURITY POLICY NUMBER: RESERVED FOR FUTURE USE RESPONSIBLE OFFICIAL TITLE: SENIOR VICE PRESIDENT FOR ADMINISTRATION AND FINANCE RESPONSIBLE OFFICE: ADMINISTRATION AND FINANCE

More information

Your Merchant Facility and Managing Risk

Your Merchant Facility and Managing Risk Your Merchant Facility and Managing Risk How to Minimise Disputes, Chargebacks and Fraudulent Transactions We want to help you get the most out of your merchant facility and provide a secure and convenient

More information

NATIONAL PAYMENT AND SETTLEMENT SYSTEMS DIVISION

NATIONAL PAYMENT AND SETTLEMENT SYSTEMS DIVISION NATIONAL PAYMENT AND SETTLEMENT SYSTEMS DIVISION MINIMUM STANDARDS FOR ELECTRONIC PAYMENT SCHEMES ADOPTED SEPTEMBER 2010 Central Bank of Swaziland Minimum standards for electronic payment schemes Page

More information

General Information for Cardholder s on PIN & PAY

General Information for Cardholder s on PIN & PAY General Information for Cardholder s on PIN & PAY As part of our on-going initiative to enhance security, we are pleased to introduce the 6-digit PIN (Personal Identification Number) for validation, replacing

More information

COLORADO STATE UNIVERSITY Financial Procedure Statements FPI 6-6

COLORADO STATE UNIVERSITY Financial Procedure Statements FPI 6-6 1. Procedure Title: PCI Compliance Program COLORADO STATE UNIVERSITY Financial Procedure Statements FPI 6-6 2. Procedure Purpose and Effect: All Colorado State University departments that accept credit/debit

More information

2.1.3 CARDHOLDER DATA SECURITY

2.1.3 CARDHOLDER DATA SECURITY University of Oxford Finance Division FINANCIAL POLICY 2.1.3 CARDHOLDER DATA SECURITY Date: 27 June 2017 Version: 1.0 Status: Draft Author: Bridget Midwinter TABLE OF CONTENTS Page Purpose... 3 Objectives...

More information

Payment Card Acceptance Administrative Policy

Payment Card Acceptance Administrative Policy Administrative Procedure Approved By: Brandon Gilliland, AVP for Finance and Controller Effective Date: January 15, 2016 History: Approval Date: September 25, 2014 Revisions: December 15, 2015 Type: Administrative

More information

RETAIL SPECIFIC NEWS Keeping you in the know

RETAIL SPECIFIC NEWS Keeping you in the know SUMMER 2013 EDITION NEWS RETAIL SPECIFIC NEWS Keeping you in the know Important ImportantInformation Information--Please Pleasekeep keepin inaasafe safeplace place This Edition of Retail Specific Dynamic

More information

- Overview of ATM transactions (cash withdrawals) in credit card fraud (2016)

- Overview of ATM transactions (cash withdrawals) in credit card fraud (2016) CONTENTS PG 3 4 5 6 7 9 10 11 12 14 15 16 17 17 18 19 19 20 21 22 27 28 EXECUTIVE SUMMARY QUALIFICATION OF INFORMATION PAYMENTS ASSOCIATION OF SOUTH AFRICA (PASA) OVERVIEW OF CREDIT CARD FRAUD (-) - Credit

More information

Business Practices Seminar April 3, 2014

Business Practices Seminar April 3, 2014 Business Practices Seminar April 3, 2014 Departmental Operations Review of Payment Card Industry Standard Assessment Process Overview Review of University Policy No. 3610 57.7 467 200+ Scott Weimer Director

More information

UPCOMING SCHEME CHANGES

UPCOMING SCHEME CHANGES UPCOMING SCHEME CHANGES MERCHANTS/PARTNERS/ISO COPY Payvision Ref: Payvision-Upcoming Scheme Changes (v1.0)-october 2015 Page 1 Rights of use: COMPLYING WITH ALL APPLICABLE COPYRIGHT LAWS IS THE RESPONSABILITY

More information

BOQ MERCHANT FACILITY

BOQ MERCHANT FACILITY BOQ MERCHANT FACILITY How to Minimise Disputes, Chargebacks and Fraudulent Transactions At BOQ, we want to help you get the most out of your merchant facility and provide a secure and convenient payment

More information

Credit Card Acceptance and Processing Procedures

Credit Card Acceptance and Processing Procedures Credit Card Acceptance and Processing Procedures Introduction Michigan Tech accepts credit cards for many payments of goods and services. Credit card payments must be processed in compliance with Payment

More information

Data breaches only or disproportionately affect retail merchants.

Data breaches only or disproportionately affect retail merchants. October 30, 2014 Mr. Jim Nussle Credit Union National Association 601 Pennsylvania Ave NW, South Bldg. Washington DC 20004 Mr. Dan Berger National Association of Federal Credit Unions 3138 10 th Street

More information

Visa Payment Acceptance Best Practices for Retail Petroleum Merchants. February 2010

Visa Payment Acceptance Best Practices for Retail Petroleum Merchants. February 2010 Visa Payment Acceptance Best Practices for Retail Petroleum Merchants February 2010 Table of Contents About This Guide......................................................... 1 Background.............................................................1

More information

Purchase Card: Strategies for a Secure Program Bank of America Merrill Lynch City of Chandler. October 7, 2010

Purchase Card: Strategies for a Secure Program Bank of America Merrill Lynch City of Chandler. October 7, 2010 Purchase Card: Strategies for a Secure Program Bank of America Merrill Lynch City of Chandler October 7, 2010 David A. Randolph, Vice President Bank of America Merrill Lynch Sharon Brause, Procurement

More information

Payment Card Industry (PCI) Qualification Requirements. For PCI Forensic Investigators (PFIs)

Payment Card Industry (PCI) Qualification Requirements. For PCI Forensic Investigators (PFIs) Payment Card Industry (PCI) Qualification Requirements For PCI Forensic Investigators (PFIs) Version 3.0 August 2016 Document Changes Date Version Description November 2012 2.0 August 2016 3.0 Amendments

More information

ARC s Guide to Travel Agency Payment Card Acceptance, Risk Mitigation and Chargeback Management

ARC s Guide to Travel Agency Payment Card Acceptance, Risk Mitigation and Chargeback Management ARC s Guide to Travel Agency Payment Card Acceptance, Risk Mitigation and Chargeback Management A concise guide with useful advice, best practices and practical examples for travel payment professionals

More information

Get the most out of your membership

Get the most out of your membership PRIVACY & SECURITY Get the most out of your membership W H AT W E V E D O N E TO G E T H E R S O FA R : Opened a new account! Reviewed the fee schedule, including any fees associated with your account

More information

SCTEM. Preventing Fraud and Misuse in Your Card Program. Presented By: Gonca Latif-Schmitt, Managing Director Citi

SCTEM. Preventing Fraud and Misuse in Your Card Program. Presented By: Gonca Latif-Schmitt, Managing Director Citi SCTEM Preventing Fraud and Misuse in Your Card Program Presented By: Gonca Latif-Schmitt, Managing Director Citi Agenda Card Misuse vs. Card Fraud - Definition Card Misuse Card Program Risks Fraud Types

More information

Dig Deep into the Root Causes of Fraud to Prevent Future Attacks

Dig Deep into the Root Causes of Fraud to Prevent Future Attacks Dig Deep into the Root Causes of Fraud to Prevent Future Attacks Presented by: Ann Davidson, VP of Risk Consulting at Allied Solutions & Tammy Behnke, Credit Union Program Director at ProSight Specialty

More information

Visa response EBA public consultation on the draft RTS on Strong Customer Authentication

Visa response EBA public consultation on the draft RTS on Strong Customer Authentication Visa response EBA public consultation on the draft RTS on Strong Customer Authentication Background The revised Payment Services Directive (PSD2) mandates to perform Strong Customer Authentication (SCA)

More information

Blackbaud Merchant Services TM Portal Features Overview Transaction Management Through the Blackbaud Merchant Services Web Portal

Blackbaud Merchant Services TM Portal Features Overview Transaction Management Through the Blackbaud Merchant Services Web Portal Blackbaud Merchant Services TM Portal Features Overview Transaction Management Through the Blackbaud Merchant Services Web Portal From the web portal, you can use many features to manage transactions and

More information

PCI FAQ Q: What is PCI? ALL process, store transmit Q: To whom does PCI apply? Q: Where can I find the PCI Data Security Standards (PCI DSS)?

PCI FAQ Q: What is PCI? ALL process, store transmit Q: To whom does PCI apply? Q: Where can I find the PCI Data Security Standards (PCI DSS)? PCI FAQ Q: What is PCI? A: The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements designed to ensure that ALL companies that process, store or transmit credit card information

More information

FIGHTING FRAUD & CHARGEBACKS 5 STRATEGIES FOR WINNING

FIGHTING FRAUD & CHARGEBACKS 5 STRATEGIES FOR WINNING FIGHTING FRAUD & CHARGEBACKS 5 STRATEGIES FOR WINNING 2 2016 was a strong year for online sales growth. But fraud and chargebacks more than kept pace. The good news? You can dramatically reduce losses

More information

THE STATE OF CHARGEBACKS: 2018 REPORT

THE STATE OF CHARGEBACKS: 2018 REPORT THE STATE OF CHARGEBACKS: 2018 REPORT THE STATE OF CHARGEBACKS: 2018 REPORT 1 Contents Executive Summary... 2 Chargeback Management... 4 Chargeback Rates... 4 Chargeback Prevention and Challenges.................................

More information

Procedure guide. For a smoother operation

Procedure guide. For a smoother operation Procedure guide For a smoother operation Welcome to Barclaycard Global Payment Acceptance About this document This procedure guide along with the Terms and Conditions and Additional Service Conditions

More information

Frequently Asked Questions

Frequently Asked Questions Account to Account Transfers... 1 Bill Pay... 1 Branch Locations and Hours... 2 Credit Card Business... 2 Credit Card Personal... 3 Cybersecurity Information... 3 Debit Cards... 4 estatements/enotices...

More information

American Express Merchant Reference Guide - Canada

American Express Merchant Reference Guide - Canada American Express Merchant Reference Guide - Canada October 2017 table of contents table of contents Copyright 2010-2017 Amex Bank of Canada. All rights reserved. introduction... 1 1.1 about American Express...

More information

Terms and Conditions including General explanatory information Information statement effective

Terms and Conditions including General explanatory information Information statement effective NAB CREDIT CARDS Terms and Conditions including General explanatory information Information statement effective 07.11.2016 Lost/stolen card reporting In Australia Call toll free, 24 hours per day 1800

More information

Using a terminal to process card transactions

Using a terminal to process card transactions Using a terminal to process card transactions General rules Read this section if you have an electronic terminal and the cardholder and card are present at the time of the transaction. If you use paper

More information

Overview of Card Regulations, Disputes, & Fraud. Tina Giorgio, President & CEO ICBA Bancard Inc.

Overview of Card Regulations, Disputes, & Fraud. Tina Giorgio, President & CEO ICBA Bancard Inc. Overview of Card Regulations, Disputes, & Fraud Tina Giorgio, President & CEO ICBA Bancard Inc. Agenda Regulation Overview Chargebacks Fraud Trends Fraud Prevention Investigation Strategies Fraud Tool

More information

SUSTAINABLE TREASURY MANAGEMENT: TRENDS, SUCCESSES AND CHALLENGES

SUSTAINABLE TREASURY MANAGEMENT: TRENDS, SUCCESSES AND CHALLENGES SUSTAINABE TREASURY MANAGEMENT: TRENDS, SUCCESSES AND CHAENGES OCTOBER 28, 2010 A Presented by: Greg ong, Vice President, Treasury Services Y P R I V A T E A N Corporate environmental sustainability As

More information

Advanced Card Payments Overview Dan Kramer

Advanced Card Payments Overview Dan Kramer Advanced Card Payments Overview Dan Kramer Senior Vice President, SHAZAM Agenda PIN-Based Transactions Signature-Based Transactions EFT Regulations Tokenization PIN-Based Transactions Intra-Network PIN-Based

More information

COMP3441 Lecture 10: Risk/Case Studies

COMP3441 Lecture 10: Risk/Case Studies COMP3441 Lecture 10: Risk/Case Studies Ron van der Meyden (University of New South Wales Sydney, Australia) May 20, 2013 Overview Risk Case Study: Banking Risk If you are afraid that crooks might try to

More information

BUSINESS POLICY. TO: All Members of the University Community 2016:07. Credit Card Processing and Security Policy (Supersedes Policy 2009:05 & 2012:12)

BUSINESS POLICY. TO: All Members of the University Community 2016:07. Credit Card Processing and Security Policy (Supersedes Policy 2009:05 & 2012:12) BUSINESS POLICY TO: All Members of the University Community 2016:07 DATE: February 2016 Credit Card Processing and Security Policy (Supersedes Policy 2009:05 & 2012:12) Contents Section 1 Scope...2 Section

More information

Important Information on Security Regarding Electronic Account Access and Regular Payment Arrangements

Important Information on Security Regarding Electronic Account Access and Regular Payment Arrangements Important Information on Security Regarding Electronic Account Access and Regular Payment Arrangements This booklet should be read in conjunction with the Terms and Conditions contained in the Financial

More information

The person you authorise to hold your additional card will share your credit limit and you will receive one statement for both cards.

The person you authorise to hold your additional card will share your credit limit and you will receive one statement for both cards. Website FAQs Applying for your card Who can apply for an AMIGO credit card? You can apply if you: Are over 18 years of age Have a regular income Are not bankrupt Are an Australian citizen or a permanent

More information

Merchant Agreement. PAGE 1 of 10 MERCHANT AGREEMENT PSiGate-Peoples effective Feb _M-M_032718

Merchant Agreement. PAGE 1 of 10 MERCHANT AGREEMENT PSiGate-Peoples effective Feb _M-M_032718 Merchant Agreement This MERCHANT AGREEMENT (this Agreement ) is entered into by and between Payment Services Interactive Gateway Inc. ( PSiGate, we, us or our ), Peoples Trust Company ( Peoples Trust ),

More information