top of page

Credit Card Security

  • ICB
  • Feb 21, 2017
  • 2 min read

Data from Australian Payments Clearing Association (APCA) to June2016 shows that 0.0279% ($530million) of all credit card and cheque transactions were fraudulent. Over the last ten years, the amount of fraud has increased significantly due to a rise in online transactions (where the physical card is not present), and sophistication of the technology used by the criminals. Types of Credit Cards

  • Stored value cards - gift cards, phone cards, petrol cards and in-store cards

  • Debit cards - connected to a bank account

  • Credit cards - connected to a credit account with an agreement that funds will be paid to the provider at a later date.

Types of Credit Cards Fraud

  • Card not presented - making purchases over phone or internet; it is easy to provide another person’s card details

  • Counterfeit card - using fake credit cards, created by ‘skimming’ the data from legitimate cards

  • Card not received - cards stolen from mailbox before the recipient receives the card; the thief activates and uses the card before the correct owner realises it has not been received

  • Application fraud - using a false identity for a credit card application

Merchant Responsibilities A business that uses credit card details must take care of security of credit card details. As a merchant you will be bound by the institution that issues the credit card payment facility and their terms of use. These institutions are in turn bound by the PCI Security Standards, (a global governing body), as well as local laws.

  • Do not store ANY sensitive cardholder details on computer or paper—this means you may not store any numbers, dates, security code or photocopy of the card. The only detail you may store is the customer’s name.

  • Some online payment gateways do store the data in encrypted form, this may be acceptable - you will need to check the provider’s information about security and privacy.

  • Ensure card readers, point-of-sale systems and online payment systems are secure and limited to approved users only. Never allow staff members or customers to remove the device from the point-of-sale area. Consider locking the device in place.

  • Mark all devices and cables with an identification number or symbol to show that it is your device.

  • Record any serial numbers provided by the facility provider and check your device against the number provided - these must match.

  • Ensure access to sensitive information during the transaction is limited to approved users

  • Use approved merchant facilities only

  • Make sure all your computer and online systems are protected with firewall, passwords, user integrity, and backups

  • Change passwords regularly

  • Check any physical merchant devices for skimming devices

  • Check that receipts issued by the device have the exact and correct merchant name.


 
 
 

Comments


Featured Posts
Recent Posts
Archive
Search By Tags
Follow Us
  • Facebook Basic Square
  • Twitter Basic Square
  • Google+ Basic Square

Call

+61 438 552 108  

MEMBER

Registered

BAS Agent

24859225

 

  • facebook
  • Twitter Clean
  • w-googleplus

Follow us

 

  • Grey Facebook Icon
  • Grey Twitter Icon
  • Grey Blogger Icon

© 2018 AMIC Bookkeeping Solutions.  All rights reserved.
 

bottom of page