SlideShare ist ein Scribd-Unternehmen logo
1 von 31
SMALL BUSINESSES:
TIPS TO AVOIDING FRAUDULENT
CHARGEBACKS
Fraud is an intentional deception made for personal gain or to damage another individual.
COMMON SCAMS
FACTORING
 Processing transactions through a merchant account for a
business or entity other than the specific business that was
screened for the merchant account
 Also called credit card laundering
 For example, if an individual operates two separate
businesses, they cannot process one store‘s sales through the
other store‘s merchant account.
 Since you are ultimately responsible for all transactions that
run through your merchant account, if any items are charged
back, you are held responsible and your account will be
debited for theses transactions.
 The crime? Factoring is used as a method to launder money
via credit cards. Visa and MasterCard can have your
merchant account shut down, and you can be substantially
fined, and placed on the TMF
CARD-NOT-PRESENT SCAMS
 The risk of fraud increases greatly if your customer and their
credit card are not present at the time a purchase is made
because you don‘t have the opportunity to inspect the card.
 ―Card-not-present‖ transactions typically occur over the phone or
fax, or are Internet sales or catalogue purchases.
 Without the card in hand, you are unable to inspect the card,
check for suspicious markings or verify the customer‘s signature.
 As a merchant, you put yourself and your company at greater risk
by accepting these types of transactions.
 If you are processing card transactions by telephone, fax or
Internet, make sure that you have signed the specific merchant
agreement required to perform Mail Order/Telephone Order
transactions where the card is not present.
 Even after you have the proper agreement in place, it is crucial
that you take the precautionary steps to prevent potential
chargebacks.
SKIMMING
 One example of skimming is where the fraudster uses a
device to read and copy the data on the magnetic strip of a
credit card – a process known as ―skimming.‖
 Other times the information is received by tapping into phone
lines. Regardless of the method used, skimming is
responsible for millions of dollars of losses.
 Typically, fraudsters ‗skim‘ the magnetic stripe in order to later
use it to Credit card skimming is when a person records the
information on a credit or debit card without the owner
knowing about it with the intention of using that credit card
information illegally.
 Be on the lookout for devices used to swipe credit cards. They
are usually box-shaped cordless devices that look like pagers
and fit in the palm of your hand. Laptop computers have also
been used to accomplish the same thing.
DON‘T BE BULLIED
 Here the ―customer― attempts to intimidate the cashier by
causing a fuss at the register so that the purchase is rushed,
which may lead to improper check out.
 They may tell you that the card won‘t read and not to bother
running it through – that you‘ll have to key it in manually.
 The crook may provide an authorization code they claim was
given to them by their bank. Don’t use it!
 If the card in hand does not work, call your processor or bank.
 If the crook demands anything else, give the card back and
deny the sale. It‘s better to lose a sell to a crook any day.
 Don‘t be intimidated by these bullies; always take your time
and make sure the correct procedure is followed when
authorizing the card.
THE MANUAL KEY-IN
 Often fraud occurs when the thief damages the card on
purpose so that you are forced to manually enter the number
in the electronic point-of-sale terminal.
 Fraudulent cards are often damaged in order to bypass the
antifraud features that are placed on them – the magnetic strip
cannot be swiped and transmitted to the verification center for
authorization in the case of a manual key-in.
 If you have an electronic point-of-sales terminal, swipe every
card that you come across – no matter how damaged or worn.
 And be wary of customers who let you know right away that
their card won‘t read.
 If the card doesn‘t work and you end up keying in the number,
make sure you take an imprint of the card.
 If the card is severely damaged, simply ask for another form of
payment.
BORROWED CARDS
 Beware of people waving letters of authorization for
use of a credit card.
 Never accept any form of verification or
authorization.
 Friends, coworkers, and spouses are not permitted
to borrow each other‘s cards.
 The only person who should be presenting the card
to you is the person whose name is on the front of
the card and signature on the back of the card.
 Chances are when the rightful owner gets the
statement a chargeback inevitably occurs.
THE TERMINAL REPAIR SCAM
 This is a classic fraud scam.
 Crooks come into your business and tell you that your POS
terminal needs to be repaired – offsite. But don‘t worry, they‘ll
replace your broken one with a loaner.
 Once the loaner is in place, all of the information you scan
through is recorded, and now the information is theirs. You
may not even see it coming, as these criminals often pretend
to work for POS companies or say that they are attending to
other official business.
 Any attempt to repair your terminal should be reported to the
police, and no replacement terminals should be accepted.
 The safest thing you can do is to be cautious and report any
suspicious happenings immediately by calling your Merchant
Services Help Desk. They will help you verify whether your
device has been scheduled for pick up and repair and as well
as the authorized repair dealer.
THE LAST MINUTE SHOPPER
 Be on the lookout for the shopper who is
purchasing expensive items just before closing
time, or someone who is hurriedly filling a
shopping cart with this type of item, without
paying much attention to price, size or quality.
 These are the shoppers whose transactions
need to be handled with your utmost attention.
 Crooks use this scam to catch merchants of
guard and not looking at the card carefully or
bypassing security protocol.
COUNTERFEIT CARDS
 Stolen and counterfeit cards are a huge problem for
merchants and credit card issuers alike.
 Because of the technology available to them, counterfeiters
are able to reproduce false cards that are high quality, even
without the benefit of the original.
 All they really need is personal information and technology
to produce credit cards, debit cards, and smart cards. The
result is a huge financial loss to businesses around the
globe.
 Protect your business by teaching your staff to recognize
the signs of a false credit card by checking the card
security features every time you make a credit card sale.
 Call in a Code 10 if you suspect that the card presented to
you seems suspicious.
YOUR FIRST LINE OF DEFENSE
CALL IN A CODE 10
 Any time you have doubts about something – a fraudulent
card, a signature or even a customer‘s behavior – call in a
Code 10.
 A Code 10 allows you to call for an authorization without the
customer becoming suspicious. After dialing the authorization
center, inform the operator that you have a Code 10. The
operator will put you through to the correct person, who will
ask you a series of ―yes‖ or ―no‖ questions.
 If the operator decides something is amiss, he or she will deny
authorization. The operator may even request to speak with
the cardholder to ask account information questions that only
the true owner of the card would know.
 Call the voice authorization phone number provided by
your Merchant Services. Choose the prompt for "Code
10"
CHARGEBACKS
TAKE CHARGE OF CHARGEBACKS
 Chargebacks are one of the most common – and
costly – ways that fraudsters take advantage of
merchants.
 For example, some fraudsters, appearing to be
legitimate customers, will take both the ―merchant
copy‖ and ―customer copy‖ of the sales slip after
they have signed it.
 When they receive their credit card statement, they
dispute the charge. And, since your company has
no record of the transaction, the full amount is
credited back to the consumer, and your business
loses the merchandise
FRAUD CHARGEBACK
 A chargeback is a transaction disputed by the
cardholder or card issuer. There are many reasons for
chargebacks, but the most common are returned
merchandise, terminated services, disputes, errors, or
fraud. Merchants must be able to provide proof that the
disputed transaction is valid and in accordance with
Visa/MasterCard regulations or risk having their account
debited for the disputed amount..
 For your business, a chargeback translates into extra
processing time and cost, a narrower profit margin for
the sale, and possibly a loss of revenue.
 It is important to carefully track and manage the
chargebacks that you receive, take steps to avoid future
chargebacks, and know your representment rights.
AVOIDING CHARGEBACKS
 Respond to retrieval requests and chargebacks promptly.
 Another suggestion to prevent fraud is to require customers to
enter the 3 digit security code on the back of their card when
ordering products online.
 Advertise honestly and have clear terms of service — these
can prevent customers from disputing transactions because
the product they purchased was not as described.
 Make it as easy as possible for customers to get customer
service, and make the return policy clear at the time of the
transaction.
 Follow the terms of service set by the card brands. Any
compliance violation can cause a merchant to lose its
chargeback rights.
 Card-present businesses can prevent chargebacks by
requiring that cards be swiped, and get a signature whenever
possible.
CHARGEBACK GUIDELINES
 Chargeback Management Guidelines for Visa
Merchants
 Chargeback Guide For MasterCard
 Merchant Chargeback guide-American Express
 Chargeback and Exception Processing Guide
VERIFICATION NUMBERS
 VISA Merchant Verification Service 800-847-2750
AUTOMATED
Option 1, Address Verification: enter in the numeric portion of the
street address, zip code, and VISA card number and it will advise
you if there is a match. Option 2, Issuing Bank Phone numbers:
enter the VISA card number and it will provide you with the 800
number for the issuing bank if available.
 MasterCard Assist 800-622-7747
Select your language preference, then Option 2. Enter the
MasterCard card number and it will provide you with the 800
number for the issuing bank if available.
 Discover Address Verification 800-347-7988 AUTOMATED
You will need your Discover Merchant number. Enter the
Discover card number and address information, and it will advise
you if there is a match.
 American Express Address Verifications 800-528-2121
Option 3 allows you to verify the name and address of a
particular AMEX card number.
CARD PRESENT/ CARD NOT PRESENT
PROCESSING TRANSACTIONS MANUALLY WITH AN
IMPRINTER
 When you process transactions manually, be sure to take an imprint of
the card every time a purchase is made with a credit card
 Hold onto the credit card throughout the sale
 Be sure to call in for authorization for every credit card transaction, if
required.
 Make sure you neatly print and fill out the sales draft so that it is
complete, clear, and easy to read
 Have the customer sign the receipt while you watch and verify that this
signature and the signature on the back of the card match
 Don‘t divide one purchase onto more than one sales draft
 Do not change or alter the sales draft after the customer has signed it – if
there‘s a dispute, the customer‘s copy is treated as correct
 If a transaction has been cancelled by the customer, take the required
steps to stop the billing or reverse it immediately
 Be sure to display your return policy at the point-of-sale – remember it is
your responsibility to inform your customers of this policy
 Maintain a well-trained staff and ensure that they follow card acceptance
check-out procedures correctly
 Save all copies of your sales draft in case of future disputes
MAIL AND TELEPHONE ORDERS
 If possible, establish the customer‘s identity by writing their
name, address, credit card number, and expiry date on the
sales slip (also include name of issuing institution)
 Be sure to call in for an authorization for every credit card
transaction, if required.
 If you are taking an order over the phone, fax or Internet, only
ship items to permanent addresses – steer clear of post office
boxes or hotel lobbies, if possible.
 Consider utilizing a shipping vendor that requires a customer
signature for delivery of merchandise. Moreover, use a
shipping vendor that can provide easy access to ‗proof of
delivery‘ information as this may assist in the chargeback
process.
 Where applicable, utilize a billing system that provides
address verification or CVV processes
 Always send a copy of the sales draft to the customer either
when the product is ordered or when it is shipped
ADVOCATE TIP#1
 Understand the consequences of high risk
transactions and be proactive in preventing
unnecessary chargebacks and taking losses.
 Be familiar with your processor‘s steps for potential
fraud. Have a list available with contact numbers for
employees to call if needed.
 Consider training classes for employees using the
resources listed in this guide.
 If you take a loss from a chargeback, follow up with
your processor or bank on how to prevent it from
happening again.
 Repetitive losses could cost you in processing pricing
FRAUD RESOURCES
 Look Up a ZIP Code – Validate if address is real
 Credit Card Fraud Prevention & Security – Discover
Card
 The FTC‘s Bureau of Consumer Protection
MASTERCARD FRAUD SECURITY
 Arming You With Knowledge
 MasterCard Security Features
 Unsigned Cards
 Design Features
 Fraud Training
VISA FRAUD SECURITY
 Visa Fraud Control
 Key-Entered Transactions
 Card Not Present
 Know the signs of possible fraud
 Skimming is a Scam
ADVOCATE TIP#2
 Keep updated on current fraud trends and training
from your processor or bank.
 Order flyers and/or posters from Visa and
MasterCard to post as reminders to employee to be
aware of fraud.
 Avoid Force Posting transactions, if you are not
able to receive a valid authorization code, ask for
another form of payment.
 If you received large international orders and you
had not before, use caution.
 Think of what you have to lose, before thinking of what
you’ll make in profit.
VERIFIED BY VISA
 Verified by Visa works to confirm an online shopper's
identity in real time by requiring an additional password
or other data to help ensure that no one but the
cardholder can use his Visa card online.
 When customers see the Verified by Visa symbol on
your site at checkout, they can rest assured that their
online transactions are protected by the brand they
know and trust.
 And, even if the cardholder isn't enrolled in the program
or their issuer isn't participating, the merchant is not
liable for certain fraud-related chargebacks on Visa
personal debit and credit card transactions.
 Protecting both merchants and consumers against fraud
MASTERCARD SECURECODE
 MasterCard SecureCode is a private code for your
MasterCard account that gives you an additional
layer of online shopping security. Only you and your
financial institution know what your code is –
retailers aren't able to see it. So you can trust that
your transactions get independent approval every
time.
 MasterCard SecureCode®
CONSIDER EMV
 EMV stands for Europay, MasterCard and Visa, a global
standard for inter-operation of integrated circuit cards (IC
cards or "chip cards") and IC card capable point of sale (POS)
terminals and automated teller machines (ATMs), for
authenticating credit and debit card transactions.
 The EMV standards define the interaction at the physical,
electrical, data and application levels between IC cards and IC
card processing devices for financial transactions.
 There are standards based on ISO/IEC 7816 for contact
cards, and standards based on ISO/IEC 14443 for contactless
cards (PayPass, payWave, ExpressPay).
 The Future of Payments with MasterCard
 Visa U.S. Merchant EMV Chip Acceptance Readiness
Guide
EMV IN THE NEWS
 ―Part of the October 2015 deadline in our roadmap
is what‘s known as the ‗liability shift.‘ Whenever
card fraud happens, we need to determine who is
liable for the costs. When the liability shift happens,
what will change is that if there is an incidence of
card fraud, whichever party has the lesser
technology will bear the liability‖ http://blogs.wsj.com/corporate-
intelligence/2014/02/06/october-2015-the-end-of-the-swipe-and-sign-credit-card/
 ―Visa and MasterCard require U.S merchants and
card-issuing banks to migrate to EMV technology
by October 2015 or face increased liability
exposure.‖
http://www.computerworld.com/s/article/9246424/EMV_smartcards_offer_security_benefits_even_without_PIN_V
isa_says
COMPANY NAMES MENTIONED HEREIN ARE THE PROPERTY OF,
AND MAY BE TRADEMARKS OF, THEIR RESPECTIVE OWNERS AND
ARE FOR EDUCATIONAL PURPOSES ONLY.
Compiled and designed by Mark Fullbright , Certified Identity
Theft Risk Management Specialist™ (CITRMS) as a free guide for
merchants to protect themselves online and POS to reduce their
exposure to chargebacks and fraud losses.
Stay Safe, Stay Secure

Weitere ähnliche Inhalte

Was ist angesagt?

Credit Card Fraud 97
Credit Card Fraud 97Credit Card Fraud 97
Credit Card Fraud 97alessio d
 
Debit Card Fees Slide Share
Debit Card Fees Slide ShareDebit Card Fees Slide Share
Debit Card Fees Slide Shareapulvermache
 
Preventing credit card fraud
Preventing credit card fraudPreventing credit card fraud
Preventing credit card fraudLaurynas Tlaber
 
White paper everything your business needs to know about chargebacks
White paper everything your business needs to know about chargebacksWhite paper everything your business needs to know about chargebacks
White paper everything your business needs to know about chargebacksPerformanceCardService
 
E commerce fraud
E commerce fraudE commerce fraud
E commerce fraudmiteshppt
 
Holiday Shopping Online Tips
Holiday Shopping Online TipsHoliday Shopping Online Tips
Holiday Shopping Online TipsFairfax County
 
Payforit and Mobile Casinos: The Ultimate Guide
Payforit and Mobile Casinos: The Ultimate GuidePayforit and Mobile Casinos: The Ultimate Guide
Payforit and Mobile Casinos: The Ultimate GuideDroid Slots
 
Discount Cards: Experiment in Customer Loyalty
Discount Cards: Experiment in Customer LoyaltyDiscount Cards: Experiment in Customer Loyalty
Discount Cards: Experiment in Customer LoyaltyVirgilio "Toy" Paralisan
 
Howtodiscuss.com where can i load my cash app card (1)
Howtodiscuss.com where can i load my cash app card (1)Howtodiscuss.com where can i load my cash app card (1)
Howtodiscuss.com where can i load my cash app card (1)Hospitalityplus1
 
White_paper_EMV-for-US-merchants-LAS
White_paper_EMV-for-US-merchants-LASWhite_paper_EMV-for-US-merchants-LAS
White_paper_EMV-for-US-merchants-LASJean-Ann Langert
 

Was ist angesagt? (20)

Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
 
Credit Card Fraud
Credit Card Fraud Credit Card Fraud
Credit Card Fraud
 
Credit Card Fraud 97
Credit Card Fraud 97Credit Card Fraud 97
Credit Card Fraud 97
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Debit Card Fees Slide Share
Debit Card Fees Slide ShareDebit Card Fees Slide Share
Debit Card Fees Slide Share
 
Payment Frauds in India
Payment Frauds in India Payment Frauds in India
Payment Frauds in India
 
Preventing credit card fraud
Preventing credit card fraudPreventing credit card fraud
Preventing credit card fraud
 
White paper everything your business needs to know about chargebacks
White paper everything your business needs to know about chargebacksWhite paper everything your business needs to know about chargebacks
White paper everything your business needs to know about chargebacks
 
Buying on Credit
Buying on CreditBuying on Credit
Buying on Credit
 
E commerce fraud
E commerce fraudE commerce fraud
E commerce fraud
 
Credit card fraud(1)
Credit card fraud(1)Credit card fraud(1)
Credit card fraud(1)
 
Holiday Shopping Online Tips
Holiday Shopping Online TipsHoliday Shopping Online Tips
Holiday Shopping Online Tips
 
Payforit and Mobile Casinos: The Ultimate Guide
Payforit and Mobile Casinos: The Ultimate GuidePayforit and Mobile Casinos: The Ultimate Guide
Payforit and Mobile Casinos: The Ultimate Guide
 
online shopping
online shoppingonline shopping
online shopping
 
Discount Cards: Experiment in Customer Loyalty
Discount Cards: Experiment in Customer LoyaltyDiscount Cards: Experiment in Customer Loyalty
Discount Cards: Experiment in Customer Loyalty
 
Howtodiscuss.com where can i load my cash app card (1)
Howtodiscuss.com where can i load my cash app card (1)Howtodiscuss.com where can i load my cash app card (1)
Howtodiscuss.com where can i load my cash app card (1)
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
Week 7
Week 7Week 7
Week 7
 
Tips to shop online
Tips to shop onlineTips to shop online
Tips to shop online
 
White_paper_EMV-for-US-merchants-LAS
White_paper_EMV-for-US-merchants-LASWhite_paper_EMV-for-US-merchants-LAS
White_paper_EMV-for-US-merchants-LAS
 

Andere mochten auch

The Attitude towards E-Learning Blogs among the Students at Taibah University...
The Attitude towards E-Learning Blogs among the Students at Taibah University...The Attitude towards E-Learning Blogs among the Students at Taibah University...
The Attitude towards E-Learning Blogs among the Students at Taibah University...Taghreed Alrehaili
 
Making Vendor Management your Main Asset
Making Vendor Management your Main AssetMaking Vendor Management your Main Asset
Making Vendor Management your Main AssetSumaLatam
 
Developing A Continuous Improvement Environment August 2009
Developing A Continuous Improvement Environment   August 2009Developing A Continuous Improvement Environment   August 2009
Developing A Continuous Improvement Environment August 2009Harvey_Schiller
 
Two Tools for Switching from EnergyCAP Enterprise to EnergyCAP Online
Two Tools for Switching from EnergyCAP Enterprise to EnergyCAP OnlineTwo Tools for Switching from EnergyCAP Enterprise to EnergyCAP Online
Two Tools for Switching from EnergyCAP Enterprise to EnergyCAP OnlineEnergyCAP, Inc.
 
Drugs and Devices Do Mix: Challenges and Opportunities for the Integrated Lif...
Drugs and Devices Do Mix: Challenges and Opportunities for the Integrated Lif...Drugs and Devices Do Mix: Challenges and Opportunities for the Integrated Lif...
Drugs and Devices Do Mix: Challenges and Opportunities for the Integrated Lif...Huron Consulting Group
 
Chargebacks - Reconciling Actuals to the General Ledger
Chargebacks - Reconciling Actuals to the General LedgerChargebacks - Reconciling Actuals to the General Ledger
Chargebacks - Reconciling Actuals to the General LedgerJeffrey Finkiel
 
Boost Margins by Automating Vendor Incentive Management
Boost Margins by Automating Vendor Incentive ManagementBoost Margins by Automating Vendor Incentive Management
Boost Margins by Automating Vendor Incentive ManagementSAP Solution Extensions
 
Catalyst 2016: Workflow and Automation
Catalyst 2016: Workflow and AutomationCatalyst 2016: Workflow and Automation
Catalyst 2016: Workflow and AutomationEnergyCAP, Inc.
 
GXS Deductions Management Solution for Retail Supply Chain
GXS Deductions Management Solution for Retail Supply ChainGXS Deductions Management Solution for Retail Supply Chain
GXS Deductions Management Solution for Retail Supply ChainGXS
 
Best practices for efficient handling of retrievals chargebacks
Best practices for efficient handling of retrievals chargebacksBest practices for efficient handling of retrievals chargebacks
Best practices for efficient handling of retrievals chargebacksJavabynataraJ
 
How to implement a strategic IT vendor management program
How to implement a strategic IT vendor management programHow to implement a strategic IT vendor management program
How to implement a strategic IT vendor management programJeff Kubacki
 
Key Performance Indicators: Valuable Tools for Measuring Performance
Key Performance Indicators: Valuable Tools for Measuring PerformanceKey Performance Indicators: Valuable Tools for Measuring Performance
Key Performance Indicators: Valuable Tools for Measuring PerformanceVesta Corporation
 
Appraisal Management Tool
Appraisal Management ToolAppraisal Management Tool
Appraisal Management ToolArti Sehgal
 
Case 4. 2 Summit electric lights up with a new erp system
Case 4. 2 Summit electric lights up with a new erp systemCase 4. 2 Summit electric lights up with a new erp system
Case 4. 2 Summit electric lights up with a new erp systemniz73
 
Iso9001 implementation increasing-value_reducing_leadtime
Iso9001 implementation increasing-value_reducing_leadtimeIso9001 implementation increasing-value_reducing_leadtime
Iso9001 implementation increasing-value_reducing_leadtimeOmnex Inc.
 

Andere mochten auch (20)

The Attitude towards E-Learning Blogs among the Students at Taibah University...
The Attitude towards E-Learning Blogs among the Students at Taibah University...The Attitude towards E-Learning Blogs among the Students at Taibah University...
The Attitude towards E-Learning Blogs among the Students at Taibah University...
 
Making Vendor Management your Main Asset
Making Vendor Management your Main AssetMaking Vendor Management your Main Asset
Making Vendor Management your Main Asset
 
Draft Deliverable : IT Cost Recovery Process Implementation Playbook
Draft Deliverable : IT Cost Recovery Process Implementation PlaybookDraft Deliverable : IT Cost Recovery Process Implementation Playbook
Draft Deliverable : IT Cost Recovery Process Implementation Playbook
 
Developing A Continuous Improvement Environment August 2009
Developing A Continuous Improvement Environment   August 2009Developing A Continuous Improvement Environment   August 2009
Developing A Continuous Improvement Environment August 2009
 
Two Tools for Switching from EnergyCAP Enterprise to EnergyCAP Online
Two Tools for Switching from EnergyCAP Enterprise to EnergyCAP OnlineTwo Tools for Switching from EnergyCAP Enterprise to EnergyCAP Online
Two Tools for Switching from EnergyCAP Enterprise to EnergyCAP Online
 
Drugs and Devices Do Mix: Challenges and Opportunities for the Integrated Lif...
Drugs and Devices Do Mix: Challenges and Opportunities for the Integrated Lif...Drugs and Devices Do Mix: Challenges and Opportunities for the Integrated Lif...
Drugs and Devices Do Mix: Challenges and Opportunities for the Integrated Lif...
 
Executive Roundtables Solutions Gsk
Executive Roundtables Solutions GskExecutive Roundtables Solutions Gsk
Executive Roundtables Solutions Gsk
 
Presentatie: Closed Loop Marketing
Presentatie: Closed Loop Marketing Presentatie: Closed Loop Marketing
Presentatie: Closed Loop Marketing
 
Chargebacks - Reconciling Actuals to the General Ledger
Chargebacks - Reconciling Actuals to the General LedgerChargebacks - Reconciling Actuals to the General Ledger
Chargebacks - Reconciling Actuals to the General Ledger
 
Boost Margins by Automating Vendor Incentive Management
Boost Margins by Automating Vendor Incentive ManagementBoost Margins by Automating Vendor Incentive Management
Boost Margins by Automating Vendor Incentive Management
 
Catalyst 2016: Workflow and Automation
Catalyst 2016: Workflow and AutomationCatalyst 2016: Workflow and Automation
Catalyst 2016: Workflow and Automation
 
GXS Deductions Management Solution for Retail Supply Chain
GXS Deductions Management Solution for Retail Supply ChainGXS Deductions Management Solution for Retail Supply Chain
GXS Deductions Management Solution for Retail Supply Chain
 
Triple m english_jk
Triple m english_jkTriple m english_jk
Triple m english_jk
 
Best practices for efficient handling of retrievals chargebacks
Best practices for efficient handling of retrievals chargebacksBest practices for efficient handling of retrievals chargebacks
Best practices for efficient handling of retrievals chargebacks
 
Five Ss[1]
Five Ss[1]Five Ss[1]
Five Ss[1]
 
How to implement a strategic IT vendor management program
How to implement a strategic IT vendor management programHow to implement a strategic IT vendor management program
How to implement a strategic IT vendor management program
 
Key Performance Indicators: Valuable Tools for Measuring Performance
Key Performance Indicators: Valuable Tools for Measuring PerformanceKey Performance Indicators: Valuable Tools for Measuring Performance
Key Performance Indicators: Valuable Tools for Measuring Performance
 
Appraisal Management Tool
Appraisal Management ToolAppraisal Management Tool
Appraisal Management Tool
 
Case 4. 2 Summit electric lights up with a new erp system
Case 4. 2 Summit electric lights up with a new erp systemCase 4. 2 Summit electric lights up with a new erp system
Case 4. 2 Summit electric lights up with a new erp system
 
Iso9001 implementation increasing-value_reducing_leadtime
Iso9001 implementation increasing-value_reducing_leadtimeIso9001 implementation increasing-value_reducing_leadtime
Iso9001 implementation increasing-value_reducing_leadtime
 

Ähnlich wie Small Businesses: Tips to Avoiding Fraudulent Chargebacks

Point of Sale Merchant Procedures
Point of Sale Merchant ProceduresPoint of Sale Merchant Procedures
Point of Sale Merchant Procedures- Mark - Fullbright
 
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive Steps
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive StepsAre You Vulnerable to Credit Card Fraud? Follow These 6 Preventive Steps
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive StepsScamchargeback
 
21 Simple Steps to Reduce Your Risk of Chargebacks
21 Simple Steps to Reduce Your Risk of Chargebacks21 Simple Steps to Reduce Your Risk of Chargebacks
21 Simple Steps to Reduce Your Risk of ChargebacksConstellation Payments
 
Credit card scams
Credit card scamsCredit card scams
Credit card scamsscamtools
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraudshreemala1
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Donald E. Hester
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfDigital EYE Media
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRon Drew
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidanceDavid Atkinson
 
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
Louise hunt.com-faceless fraudsters  5 helpful tips (1)Louise hunt.com-faceless fraudsters  5 helpful tips (1)
Louise hunt.com-faceless fraudsters 5 helpful tips (1)Louise Hunt
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca- Mark - Fullbright
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissectedamiable_indian
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008ClubHack
 

Ähnlich wie Small Businesses: Tips to Avoiding Fraudulent Chargebacks (20)

Point of Sale Merchant Procedures
Point of Sale Merchant ProceduresPoint of Sale Merchant Procedures
Point of Sale Merchant Procedures
 
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive Steps
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive StepsAre You Vulnerable to Credit Card Fraud? Follow These 6 Preventive Steps
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive Steps
 
21 Simple Steps to Reduce Your Risk of Chargebacks
21 Simple Steps to Reduce Your Risk of Chargebacks21 Simple Steps to Reduce Your Risk of Chargebacks
21 Simple Steps to Reduce Your Risk of Chargebacks
 
Credit card scams
Credit card scamsCredit card scams
Credit card scams
 
Handling Payments
Handling PaymentsHandling Payments
Handling Payments
 
Credit_Card_Fraud.ppt
Credit_Card_Fraud.pptCredit_Card_Fraud.ppt
Credit_Card_Fraud.ppt
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Credit_Card_Fraud.ppt
Credit_Card_Fraud.pptCredit_Card_Fraud.ppt
Credit_Card_Fraud.ppt
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Skimming is a Scam
Skimming is a ScamSkimming is a Scam
Skimming is a Scam
 
Credit card frauds
Credit card frauds Credit card frauds
Credit card frauds
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
ATM.pdf.pptx
ATM.pdf.pptxATM.pdf.pptx
ATM.pdf.pptx
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidance
 
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
Louise hunt.com-faceless fraudsters  5 helpful tips (1)Louise hunt.com-faceless fraudsters  5 helpful tips (1)
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
 

Mehr von - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Mehr von - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Kürzlich hochgeladen

General views of Histopathology and step
General views of Histopathology and stepGeneral views of Histopathology and step
General views of Histopathology and stepobaje godwin sunday
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfMohonDas
 
How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17Celine George
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesCeline George
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...CaraSkikne1
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxheathfieldcps1
 
CAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxCAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxSaurabhParmar42
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfMohonDas
 
Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphNetziValdelomar1
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxraviapr7
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptxmary850239
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxraviapr7
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17Celine George
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxKatherine Villaluna
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRATanmoy Mishra
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.EnglishCEIPdeSigeiro
 

Kürzlich hochgeladen (20)

General views of Histopathology and step
General views of Histopathology and stepGeneral views of Histopathology and step
General views of Histopathology and step
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdf
 
How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 Sales
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
CAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxCAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptx
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdf
 
Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a Paragraph
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptx
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptx
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptx
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptx
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.
 

Small Businesses: Tips to Avoiding Fraudulent Chargebacks

  • 1. SMALL BUSINESSES: TIPS TO AVOIDING FRAUDULENT CHARGEBACKS Fraud is an intentional deception made for personal gain or to damage another individual.
  • 3. FACTORING  Processing transactions through a merchant account for a business or entity other than the specific business that was screened for the merchant account  Also called credit card laundering  For example, if an individual operates two separate businesses, they cannot process one store‘s sales through the other store‘s merchant account.  Since you are ultimately responsible for all transactions that run through your merchant account, if any items are charged back, you are held responsible and your account will be debited for theses transactions.  The crime? Factoring is used as a method to launder money via credit cards. Visa and MasterCard can have your merchant account shut down, and you can be substantially fined, and placed on the TMF
  • 4. CARD-NOT-PRESENT SCAMS  The risk of fraud increases greatly if your customer and their credit card are not present at the time a purchase is made because you don‘t have the opportunity to inspect the card.  ―Card-not-present‖ transactions typically occur over the phone or fax, or are Internet sales or catalogue purchases.  Without the card in hand, you are unable to inspect the card, check for suspicious markings or verify the customer‘s signature.  As a merchant, you put yourself and your company at greater risk by accepting these types of transactions.  If you are processing card transactions by telephone, fax or Internet, make sure that you have signed the specific merchant agreement required to perform Mail Order/Telephone Order transactions where the card is not present.  Even after you have the proper agreement in place, it is crucial that you take the precautionary steps to prevent potential chargebacks.
  • 5. SKIMMING  One example of skimming is where the fraudster uses a device to read and copy the data on the magnetic strip of a credit card – a process known as ―skimming.‖  Other times the information is received by tapping into phone lines. Regardless of the method used, skimming is responsible for millions of dollars of losses.  Typically, fraudsters ‗skim‘ the magnetic stripe in order to later use it to Credit card skimming is when a person records the information on a credit or debit card without the owner knowing about it with the intention of using that credit card information illegally.  Be on the lookout for devices used to swipe credit cards. They are usually box-shaped cordless devices that look like pagers and fit in the palm of your hand. Laptop computers have also been used to accomplish the same thing.
  • 6. DON‘T BE BULLIED  Here the ―customer― attempts to intimidate the cashier by causing a fuss at the register so that the purchase is rushed, which may lead to improper check out.  They may tell you that the card won‘t read and not to bother running it through – that you‘ll have to key it in manually.  The crook may provide an authorization code they claim was given to them by their bank. Don’t use it!  If the card in hand does not work, call your processor or bank.  If the crook demands anything else, give the card back and deny the sale. It‘s better to lose a sell to a crook any day.  Don‘t be intimidated by these bullies; always take your time and make sure the correct procedure is followed when authorizing the card.
  • 7. THE MANUAL KEY-IN  Often fraud occurs when the thief damages the card on purpose so that you are forced to manually enter the number in the electronic point-of-sale terminal.  Fraudulent cards are often damaged in order to bypass the antifraud features that are placed on them – the magnetic strip cannot be swiped and transmitted to the verification center for authorization in the case of a manual key-in.  If you have an electronic point-of-sales terminal, swipe every card that you come across – no matter how damaged or worn.  And be wary of customers who let you know right away that their card won‘t read.  If the card doesn‘t work and you end up keying in the number, make sure you take an imprint of the card.  If the card is severely damaged, simply ask for another form of payment.
  • 8. BORROWED CARDS  Beware of people waving letters of authorization for use of a credit card.  Never accept any form of verification or authorization.  Friends, coworkers, and spouses are not permitted to borrow each other‘s cards.  The only person who should be presenting the card to you is the person whose name is on the front of the card and signature on the back of the card.  Chances are when the rightful owner gets the statement a chargeback inevitably occurs.
  • 9. THE TERMINAL REPAIR SCAM  This is a classic fraud scam.  Crooks come into your business and tell you that your POS terminal needs to be repaired – offsite. But don‘t worry, they‘ll replace your broken one with a loaner.  Once the loaner is in place, all of the information you scan through is recorded, and now the information is theirs. You may not even see it coming, as these criminals often pretend to work for POS companies or say that they are attending to other official business.  Any attempt to repair your terminal should be reported to the police, and no replacement terminals should be accepted.  The safest thing you can do is to be cautious and report any suspicious happenings immediately by calling your Merchant Services Help Desk. They will help you verify whether your device has been scheduled for pick up and repair and as well as the authorized repair dealer.
  • 10. THE LAST MINUTE SHOPPER  Be on the lookout for the shopper who is purchasing expensive items just before closing time, or someone who is hurriedly filling a shopping cart with this type of item, without paying much attention to price, size or quality.  These are the shoppers whose transactions need to be handled with your utmost attention.  Crooks use this scam to catch merchants of guard and not looking at the card carefully or bypassing security protocol.
  • 11. COUNTERFEIT CARDS  Stolen and counterfeit cards are a huge problem for merchants and credit card issuers alike.  Because of the technology available to them, counterfeiters are able to reproduce false cards that are high quality, even without the benefit of the original.  All they really need is personal information and technology to produce credit cards, debit cards, and smart cards. The result is a huge financial loss to businesses around the globe.  Protect your business by teaching your staff to recognize the signs of a false credit card by checking the card security features every time you make a credit card sale.  Call in a Code 10 if you suspect that the card presented to you seems suspicious.
  • 12. YOUR FIRST LINE OF DEFENSE CALL IN A CODE 10  Any time you have doubts about something – a fraudulent card, a signature or even a customer‘s behavior – call in a Code 10.  A Code 10 allows you to call for an authorization without the customer becoming suspicious. After dialing the authorization center, inform the operator that you have a Code 10. The operator will put you through to the correct person, who will ask you a series of ―yes‖ or ―no‖ questions.  If the operator decides something is amiss, he or she will deny authorization. The operator may even request to speak with the cardholder to ask account information questions that only the true owner of the card would know.  Call the voice authorization phone number provided by your Merchant Services. Choose the prompt for "Code 10"
  • 14. TAKE CHARGE OF CHARGEBACKS  Chargebacks are one of the most common – and costly – ways that fraudsters take advantage of merchants.  For example, some fraudsters, appearing to be legitimate customers, will take both the ―merchant copy‖ and ―customer copy‖ of the sales slip after they have signed it.  When they receive their credit card statement, they dispute the charge. And, since your company has no record of the transaction, the full amount is credited back to the consumer, and your business loses the merchandise
  • 15. FRAUD CHARGEBACK  A chargeback is a transaction disputed by the cardholder or card issuer. There are many reasons for chargebacks, but the most common are returned merchandise, terminated services, disputes, errors, or fraud. Merchants must be able to provide proof that the disputed transaction is valid and in accordance with Visa/MasterCard regulations or risk having their account debited for the disputed amount..  For your business, a chargeback translates into extra processing time and cost, a narrower profit margin for the sale, and possibly a loss of revenue.  It is important to carefully track and manage the chargebacks that you receive, take steps to avoid future chargebacks, and know your representment rights.
  • 16. AVOIDING CHARGEBACKS  Respond to retrieval requests and chargebacks promptly.  Another suggestion to prevent fraud is to require customers to enter the 3 digit security code on the back of their card when ordering products online.  Advertise honestly and have clear terms of service — these can prevent customers from disputing transactions because the product they purchased was not as described.  Make it as easy as possible for customers to get customer service, and make the return policy clear at the time of the transaction.  Follow the terms of service set by the card brands. Any compliance violation can cause a merchant to lose its chargeback rights.  Card-present businesses can prevent chargebacks by requiring that cards be swiped, and get a signature whenever possible.
  • 17. CHARGEBACK GUIDELINES  Chargeback Management Guidelines for Visa Merchants  Chargeback Guide For MasterCard  Merchant Chargeback guide-American Express  Chargeback and Exception Processing Guide
  • 18. VERIFICATION NUMBERS  VISA Merchant Verification Service 800-847-2750 AUTOMATED Option 1, Address Verification: enter in the numeric portion of the street address, zip code, and VISA card number and it will advise you if there is a match. Option 2, Issuing Bank Phone numbers: enter the VISA card number and it will provide you with the 800 number for the issuing bank if available.  MasterCard Assist 800-622-7747 Select your language preference, then Option 2. Enter the MasterCard card number and it will provide you with the 800 number for the issuing bank if available.  Discover Address Verification 800-347-7988 AUTOMATED You will need your Discover Merchant number. Enter the Discover card number and address information, and it will advise you if there is a match.  American Express Address Verifications 800-528-2121 Option 3 allows you to verify the name and address of a particular AMEX card number.
  • 19. CARD PRESENT/ CARD NOT PRESENT
  • 20. PROCESSING TRANSACTIONS MANUALLY WITH AN IMPRINTER  When you process transactions manually, be sure to take an imprint of the card every time a purchase is made with a credit card  Hold onto the credit card throughout the sale  Be sure to call in for authorization for every credit card transaction, if required.  Make sure you neatly print and fill out the sales draft so that it is complete, clear, and easy to read  Have the customer sign the receipt while you watch and verify that this signature and the signature on the back of the card match  Don‘t divide one purchase onto more than one sales draft  Do not change or alter the sales draft after the customer has signed it – if there‘s a dispute, the customer‘s copy is treated as correct  If a transaction has been cancelled by the customer, take the required steps to stop the billing or reverse it immediately  Be sure to display your return policy at the point-of-sale – remember it is your responsibility to inform your customers of this policy  Maintain a well-trained staff and ensure that they follow card acceptance check-out procedures correctly  Save all copies of your sales draft in case of future disputes
  • 21. MAIL AND TELEPHONE ORDERS  If possible, establish the customer‘s identity by writing their name, address, credit card number, and expiry date on the sales slip (also include name of issuing institution)  Be sure to call in for an authorization for every credit card transaction, if required.  If you are taking an order over the phone, fax or Internet, only ship items to permanent addresses – steer clear of post office boxes or hotel lobbies, if possible.  Consider utilizing a shipping vendor that requires a customer signature for delivery of merchandise. Moreover, use a shipping vendor that can provide easy access to ‗proof of delivery‘ information as this may assist in the chargeback process.  Where applicable, utilize a billing system that provides address verification or CVV processes  Always send a copy of the sales draft to the customer either when the product is ordered or when it is shipped
  • 22. ADVOCATE TIP#1  Understand the consequences of high risk transactions and be proactive in preventing unnecessary chargebacks and taking losses.  Be familiar with your processor‘s steps for potential fraud. Have a list available with contact numbers for employees to call if needed.  Consider training classes for employees using the resources listed in this guide.  If you take a loss from a chargeback, follow up with your processor or bank on how to prevent it from happening again.  Repetitive losses could cost you in processing pricing
  • 23. FRAUD RESOURCES  Look Up a ZIP Code – Validate if address is real  Credit Card Fraud Prevention & Security – Discover Card  The FTC‘s Bureau of Consumer Protection
  • 24. MASTERCARD FRAUD SECURITY  Arming You With Knowledge  MasterCard Security Features  Unsigned Cards  Design Features  Fraud Training
  • 25. VISA FRAUD SECURITY  Visa Fraud Control  Key-Entered Transactions  Card Not Present  Know the signs of possible fraud  Skimming is a Scam
  • 26. ADVOCATE TIP#2  Keep updated on current fraud trends and training from your processor or bank.  Order flyers and/or posters from Visa and MasterCard to post as reminders to employee to be aware of fraud.  Avoid Force Posting transactions, if you are not able to receive a valid authorization code, ask for another form of payment.  If you received large international orders and you had not before, use caution.  Think of what you have to lose, before thinking of what you’ll make in profit.
  • 27. VERIFIED BY VISA  Verified by Visa works to confirm an online shopper's identity in real time by requiring an additional password or other data to help ensure that no one but the cardholder can use his Visa card online.  When customers see the Verified by Visa symbol on your site at checkout, they can rest assured that their online transactions are protected by the brand they know and trust.  And, even if the cardholder isn't enrolled in the program or their issuer isn't participating, the merchant is not liable for certain fraud-related chargebacks on Visa personal debit and credit card transactions.  Protecting both merchants and consumers against fraud
  • 28. MASTERCARD SECURECODE  MasterCard SecureCode is a private code for your MasterCard account that gives you an additional layer of online shopping security. Only you and your financial institution know what your code is – retailers aren't able to see it. So you can trust that your transactions get independent approval every time.  MasterCard SecureCode®
  • 29. CONSIDER EMV  EMV stands for Europay, MasterCard and Visa, a global standard for inter-operation of integrated circuit cards (IC cards or "chip cards") and IC card capable point of sale (POS) terminals and automated teller machines (ATMs), for authenticating credit and debit card transactions.  The EMV standards define the interaction at the physical, electrical, data and application levels between IC cards and IC card processing devices for financial transactions.  There are standards based on ISO/IEC 7816 for contact cards, and standards based on ISO/IEC 14443 for contactless cards (PayPass, payWave, ExpressPay).  The Future of Payments with MasterCard  Visa U.S. Merchant EMV Chip Acceptance Readiness Guide
  • 30. EMV IN THE NEWS  ―Part of the October 2015 deadline in our roadmap is what‘s known as the ‗liability shift.‘ Whenever card fraud happens, we need to determine who is liable for the costs. When the liability shift happens, what will change is that if there is an incidence of card fraud, whichever party has the lesser technology will bear the liability‖ http://blogs.wsj.com/corporate- intelligence/2014/02/06/october-2015-the-end-of-the-swipe-and-sign-credit-card/  ―Visa and MasterCard require U.S merchants and card-issuing banks to migrate to EMV technology by October 2015 or face increased liability exposure.‖ http://www.computerworld.com/s/article/9246424/EMV_smartcards_offer_security_benefits_even_without_PIN_V isa_says
  • 31. COMPANY NAMES MENTIONED HEREIN ARE THE PROPERTY OF, AND MAY BE TRADEMARKS OF, THEIR RESPECTIVE OWNERS AND ARE FOR EDUCATIONAL PURPOSES ONLY. Compiled and designed by Mark Fullbright , Certified Identity Theft Risk Management Specialist™ (CITRMS) as a free guide for merchants to protect themselves online and POS to reduce their exposure to chargebacks and fraud losses. Stay Safe, Stay Secure