Credit Card Security
- ICB
- Feb 21, 2017
- 2 min read
Data from Australian Payments Clearing Association (APCA) to June2016 shows that 0.0279% ($530million) of all credit card and cheque transactions were fraudulent. Over the last ten years, the amount of fraud has increased significantly due to a rise in online transactions (where the physical card is not present), and sophistication of the technology used by the criminals. Types of Credit Cards
Stored value cards - gift cards, phone cards, petrol cards and in-store cards
Debit cards - connected to a bank account
Credit cards - connected to a credit account with an agreement that funds will be paid to the provider at a later date.
Types of Credit Cards Fraud
Card not presented - making purchases over phone or internet; it is easy to provide another person’s card details
Counterfeit card - using fake credit cards, created by ‘skimming’ the data from legitimate cards
Card not received - cards stolen from mailbox before the recipient receives the card; the thief activates and uses the card before the correct owner realises it has not been received
Application fraud - using a false identity for a credit card application
Merchant Responsibilities A business that uses credit card details must take care of security of credit card details. As a merchant you will be bound by the institution that issues the credit card payment facility and their terms of use. These institutions are in turn bound by the PCI Security Standards, (a global governing body), as well as local laws.
Do not store ANY sensitive cardholder details on computer or paper—this means you may not store any numbers, dates, security code or photocopy of the card. The only detail you may store is the customer’s name.
Some online payment gateways do store the data in encrypted form, this may be acceptable - you will need to check the provider’s information about security and privacy.
Ensure card readers, point-of-sale systems and online payment systems are secure and limited to approved users only. Never allow staff members or customers to remove the device from the point-of-sale area. Consider locking the device in place.
Mark all devices and cables with an identification number or symbol to show that it is your device.
Record any serial numbers provided by the facility provider and check your device against the number provided - these must match.
Ensure access to sensitive information during the transaction is limited to approved users
Use approved merchant facilities only
Make sure all your computer and online systems are protected with firewall, passwords, user integrity, and backups
Change passwords regularly
Check any physical merchant devices for skimming devices
Check that receipts issued by the device have the exact and correct merchant name.

























Comments