CARD ACCEPTANCE PROCEDURES Facilitator: Kristy A Stanley Fraud and Compliance Officer June 16 2011.

Slides:



Advertisements
Similar presentations
JPMorgan Chase Purchasing Card Training
Advertisements

What Are the Functions of ATM Machines?
Card Verification Support
October 28, Who? What? When? Why? Comply with PCI compliance policies set forth by industry Create internal policies and procedures to protect.
CARIBBEAN CREDIT CARD CORPORATION LTD.
National Bank of Dominica Ltd Merchant Seminar Facilitator: Janiere Frank Fraud & Compliance Analyst June 16, 2011.
CHAPTER 25 Checking Accounts. CHAPTER 25 Checking Accounts.
Limiting Exposure to Fraudulent Transactions & What to do if you suspect fraud Facilitator: Janiere Frank Fraud & Compliance Analyst June 16, 2011.
Accepting Credit Cards and PCI Compliance
Welcome to the Asian Jewellery Seminar. Copyright - The Birmingham Assay Office 2012 Average Gold price 1973 to 2011.
Warm-up: April 11 What’s the difference between a checking and savings account?
Debit Card Plastic card that looks like a credit card
©2008 TTW Where “Lean” principles are considered common sense and are implemented with a passion! Product Training Credit Cards.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
Chapter 4 Billing Schemes.
Youngstown State University PCI Training enter or left click on mouse to advance slides.
Credit cards and Debit Cards, Credit and Debt
Unit 231: Process payments for purchases in a retail environment
3. 18 Methods of making and receiving payments Methods of making and receiving payments Banks and bank accounts  All businesses have bank accounts.
EPS (Electronic payment system) is an online business process used for fund transfer using electronic means, i.e  Personal computers  services  Mobile.
Student Affairs Buying 101 Procurement Methods Students First Topic
Input Design Objectives
EFTPOS and credit Card payments Jana Skriveris Line 4 Due: 14 th Nov Business Admin.
NetService Cardholder Tutorial GE Corporate Payment Services 4246 South Riverboat Road Salt Lake City, Utah Copyright Information.
Secure Electronic Transaction (SET)
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
CREDIT CARD FRAUD. TYPES OF CREDIT CARD FRAUD Counterfeit credit card use. Card lost or stolen by the card holder. Fraud committed without the actual.
Traditional and Electronic Payment Methods Chapter 3.
Chapter 24 Stock Handling and Inventory Control 1 Marketing Essentials Chapter 24 Stock Handling and Inventory Control Section 24.1 The Stock Handling.
Departmental Deposit Procedures Handling of University Funds Tarleton State University Created October 2007.
Arkansas & Oklahoma’s Leading Process Service Provider.
Purchasing Items Needed by a Business
Chapter 4 Billing Schemes.
e-Learning Module Credit/Debit Payment Card Acceptance and Security
0 Glencoe Accounting Unit 4 Chapter 15 Copyright © by The McGraw-Hill Companies, Inc. All rights reserved. Unit 4 The Accounting Cycle for a Merchandising.
Procurement Card Program. This program was established to allow rapid purchases of repetitive or low dollar goods and services while simultaneously reducing.
Execute sales transactions. Sales transactions include: Cash or check Debit card sales Credit card sales Layaway sales On approval sale Cash-on-delivery.
Checking Account & Debit Card Understanding Checking Accounts and Debit Card Transactions.
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
CASH HANDLING POLICIES AND PROCEDURES TRAINING
Fall  Comply with PCI compliance policies set forth by industry  Create internal policies and procedures to protect cardholder data  Inform and.
T O S H I B AT O S H I B A Fraud & Disputes – Know Who You Are Trading With.
Salient features of facility:  Minimum amount of withdrawal Rs.100/- (thereafter in multiples of Rs.100/- ).  Maximum of Rs.1000/- per day per.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
PKI Services for CYPRUS STOCK EXCHANGE Kostas Nousias.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
© 2014 Cengage Learning. All Rights Reserved. Learning Objectives © 2014 Cengage Learning. All Rights Reserved. LO1 Explain the purpose of entering the.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
Introduction What would our society be like now if we did not have ATm’s? Not able to access money when we urgently want it. You will have to go to the.
Purchasing Card Program (P-Cards)
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
Fraud Procedures Tips for Mitigation Fraud Case Process.
UW Whitewater Procurement Card Program. Overview The purpose of UW-Whitewater Procurement Card Program is to establish a more efficient, cost- effective.
Personal Finance Credit Cards. Types of Credit Cards Bank card – Visa, MasterCard Store card – Macy’s, Kohl’s, Boscovs Travel and Entertainment – American.
UW Whitewater Procurement Card Program
Take Charge of your Finances
PCI-DSS Security Awareness
Checking Account & Debit Card Simulation
IUP Travel Card Training
Take Charge of your Finances
UGA Extension Credit Card Processing Training
Checking Account & Debit Card Simulation
P-Card Bookkeeper Training
© 2014 Cengage Learning. All Rights Reserved.
Fraud Prevention.
Product Training Credit Cards
© 2014 Cengage Learning. All Rights Reserved.
Take Charge of your Finances
Authorization for Credit Card Use
Payment Card Industry Data Security Standards (PCI-DSS) Training
Presentation transcript:

CARD ACCEPTANCE PROCEDURES Facilitator: Kristy A Stanley Fraud and Compliance Officer June

Legal Disclosure These materials are provided for informational purposes only and should not be relied upon for marketing, legal, regulatory or other advice. You should independently evaluate all content and recommendations in light of your specific business needs, operations and policies as well as any applicable laws and regulations. Caribbean Credit Card Corporation Ltd. is not responsible for your use of these materials, including errors of any kind, or any assumptions or conclusions you might draw from their use. Use of the following information is the sole and exclusive responsibility of the user.

CARD ACCEPTANCE PROCEDURES 1. CARD PRESENT ENVIRONMENT 2. CARD-NOT-PRESENT ENVIRONMENT

CARD ACCEPTANCE PROCEDURES SIX EASY STEPS 1. CHECK SECURITY FEATURES 2. OBTAIN AUTHORIZATION 3. COMPARE CARD INFORMATION TO POS TERMINAL OR SALES RECEIPT 4. COMPARE SIGNATURE ON CARD TO SIGNATURE ON SALES RECEIPT 5. LOOK OUT FOR SUSPICIOUS BEHAVIOUR 6. IF YOU SUSPECT FRAUD, MAKE A CODE 10 CALL CARD PRESENT ENVIRONMENT

Card Acceptance Procedures

CHECK THE SECURITY FEATURES Front: Embossed/ printed account number 4 digit bin number Cardholder name/identifier Visa/MCard brand mark and UV element Chip Expiration date Visa/MCard hologram* Cardholder Name Magnetic Stripe Signature panel Visa/MCard Brand Mark Visa/MCard Hologram CVV2 “Flying V”/ “MC” 4 digit Bin number Product name Bank identification area

CHECK SECURITY FEATURES BACK: 1. Magnetic/Holographic magnetic stripe 2. CVV2 (Visa)/CVC2 (MCard) 3. Signature Panel Card is not valid if it is not signed “See ID” is not a valid substitute for a signature “Void” appears if the card has been tampered with 4. Card Source Identification If found please return to Caribbean Credit Card Corporation P O Box 993, Basseterre, St Kitts

OBTAIN AUTHORIZATION Swipe magnetic strip/ Key enter transaction/ Voice Authorization

COMPARE CARD INFORMATION If card is swiped: Match: the name on the card with customer’s ID the number on card with the number on the terminal or sales receipt. the last four digits on the front of the card with the four digits in the signature panel. If cardholder’s name is printed on the receipt ensure that it matches the embossed name on the card.

COMPARE SIGNATURES In all cases ensure that the signature on the sales receipt matches the signature on the back of the card. If the card is not signed: Ask the customer to sign the card in your presence and compare to the signature on the ID If the customer refuses to sign the card, ask for another form of payment.

LOOK OUT FOR SUSPICIOUS BEHAVIOUR Examples of Suspicious Behaviour Purchase a lot of merchandise without regard to color, size, style, or price Ask no questions on major purchases Refuses free delivery for large items

MAKE A CODE 10 CALL IF YOU SUSPECT THAT A CARDHOLDER IS ATTEMPTING TO MAKE A FRAUDULENT TRANSACTION, MAKE A CODE 10 CALL TO YOUR CARD CENTRE.

CARD RECOVERY PROCEDURES If you are instructed to pick up the card:  Notify the cardholder and retain the card only if it is safe to do so.  Notify your bank that you recovered a card and ask for further instructions; explain the circumstances surrounding the pickup.  Cut the card Visa – cut horizontally being careful not to damage the card number, the magnetic stripe or the hologram. MCard – cut in half through the magnetic stripe.  Send the card pieces directly to your sponsor bank within 2 – 3 days – Rewards may apply

CARD ACCEPTANCE PROCEDURES 1. Request authorization for ALL transactions 2. Ask for the CVV2 or CVC2 number 3. Verify the cardholder’s address with the cardholder’s bank 4. Look out for suspicious orders 5. If you suspect fraud, ask for more information and verify the order CARD-NOT-PRESENT ENVIRONMENT

Authorization 1. An invalid or missing expiration date may be an indication that the card is invalid and of whether the customer has the card in hand. 2. The CVV2 and CVC2 numbers can confirm that the card is genuine.(A “match” or “no match” response is usually provided.) This information should not be stored after the transaction is completed.

LOOK OUT FOR SUSPICIOUS ORDERS Examples of suspicious orders: Hesitation to provide personal information (may be an indication that the customer is using a false identity.) Larger than normal orders

ASK FOR MORE INFORMATION & VERIFY ORDER Ask for the name of the issuing bank or the 6 digit bin number. Request day and night telephone numbers and verify through directory assistance or by calling the customer directly. Separately confirm the order with the customer by sending a note to the customer’s billing address instead of the shipping address given.

THE END THANK YOU QUESTIONS & COMMENTS