Merchant Services Best Practice Guide
Merchant Services Best Practice Guide
Please make the time for you and your staff to review this Card Fraud
Protection Booklet.
The more you know about the potential risks the more you’ll be able to
protect your business against chargebacks and fraud.
2
TYPES OF CARDS
Debit Card: A debit Card is issued by a financial institution. Purchases made with
Debit Cards result in the immediate withdrawal of funds from the Cardholder’s
bank account. Debit Cards do not represent a line of credit they can only be
used of the extend the Cardholder has available funds in the account associated
with the Debit Card. Discover Network, Visa and MasterCard offer Debit Cards
in addition to Covered/Credit Cards. Debit Cards that are processed in Covered/
Credit Card Association networks are typically signature-based Debit cards,
while Debit Cards that are processed on EFT Networks are generally Personal
Identification Number (PIN)-based Debit Cards.
Automated Teller Machine (ATM) Card: An ATM Card is a plastic card issued
by a financial institution that allows a Cardholder to withdraw funds, make
deposit, make purchases or perform other banking functions against the
Cardholder’s bank account through an ATM or POS Device.
Electronic Gift Cards (EGC): EGCs are issued by Merchants at a set amount
for future purchases. When a Cardholder uses an EGC to make a purchase the
Transaction total is deducted from the value remaining in the Card until the
pre-paid amount is spent.
3
HOW TO BEST PROTECT
YOUR BUSINESS
High-Risk Transactions
• Card Not Present
• Card number is manually keyed in
• Foreign issued cards
• No authorization obtained
• Card is not swiped through POS Terminal
• Fall back transactions using the magnetic stripe of a Chip card
• Split Transactions
• Multiple Transactions at same time
Lower-Risk Transactions
• Card Present
• Card is CHIP read through POS Terminal
• Verified by Visa/MasterCard SecureCode and JSecure Transaction in case of
e-com transactions
High chargeback levels and/or the acceptance of excessive fraud could attract
penalties from the Card Schemes (Visa, MasterCard or the other card schemes)
and in some cases this could even result in the termination of your merchant
services facility by ADIB MERCHANT SERVICES.
4
RESPONSIBILITIES
verify that the purchaser of goods and services is the genuine cardholder.
Your merchant agreement specifies that you are responsible for preventing
fraud occurring via your services, ensuring the physical security of your
merchant equipment and protection of cardholder information. For this reason
it is essential that you understand:
• How your business can become a target of fraud.
• How fraud can be detected.
• Your liabilities.
• Precautions you need to take.
Proprietor Transactions
Funds transferred from a Covered/Credit Card in the proprietor’s name via their
merchant services to their settlement account are classified as a Proprietor
Transaction. Transferring funds in this manner is not only costly (you will
be charged a merchant service fee for each transaction) but a breach of your
merchant agreement. For Transactions such as transfers and bill payments you
will need to utilize other banking services.
Split Transactions
You are responsible for the physical security of your merchant services. It is
5
important that you secure POS terminal equipment safely and never leave your
terminal unattended during trading hours. You should never allow a cardholder
to instruct you on how to process a transaction or have access to your terminal
except for PIN input.
Fraudsters may approach your business posing as a terminal, electrical or phone
line technician advising that they need access to your terminal. They may then
process refund transactions or insert card readers into your terminal that will
enable them to steal cardholder information whenever the card is swiped.
Always check the identification of technicians attending your premises and
never reveal any passwords. If suspicious contact your relationship manager.
SHARI’A COMPLIANCE
As ADIB MERCHANT SERVICE is based on principles of SHARI’A Law, you as a
Merchant are requested to follow ADIB’s Shari’a Compliance policy while using
it’s terminals and to avoid using its terminals for non-Shari’a products/Services.
Not following this rule will lead to violation of SHARI’A principles, such
violations may lead to the termination of the merchant agreement.
You are requested to use POS Rolls provided by ADIB Merchant Services only.
Use of other bank stationery or/and promoting other banks products and
services through ADIB terminals is not allowed & merchants found doing these
activities will be advised to stop as such activities may lead to the termination
of the merchant agreement.
6
REFUND FRAUD
A common type of fraud involves employees issuing credits (REFUNDS) to
personal/own accounts via the POS TERMINAL. To avoid detection they may
create a large sale on a fraudulent card then process a refund to their own card.
Refunds may also be processed to their own cards without a corresponding sale.
To guard against this type of fraud we recommend you to closely monitor
all refunds, checking that all refunds correspond to a legitimate sale and are
refunded back to the original purchase card. Particular attention should be paid
to large or multiple refund amounts.
Ensure only authorized staff are aware of your refund limits and refund
password. Your refund password should be changed when your terminal is
installed. It should be unique, changed frequently and kept secure.
CHARGEBACKS
You as the merchant may be faced with the prospect of incurring
chargebacks, which can have a financial impact on your business.
A chargeback occurs when the cardholder (or their bank) raises a dispute in
connection with a Covered/Credit/ Debit Card transaction. If the dispute
is resolved in favor of the cardholder, the transaction is charged back to the
merchant and debited to your settlement account. In other words, you as the
merchant could possibly lose the value of the sale and incur a chargeback fee.
Common reasons for chargebacks include but are not limited to:
• Cardholder does not recognize the transaction (business name on statement
is not recognized).
• Cardholder did not authorize the transaction (frequently an indication of
fraud).
• Cancelled recurring transaction.
7
• Goods/services not as described.
• Goods/services not received.
• No authorization obtained
• Refund not received.
• Transaction processed more than once (Duplicated).
Disputes can generally be raised by either the cardholder or their bank for
up to 18 months from the transaction date or from the date the goods or
services should have been provided. For this reason you are required under
your merchant agreement to retain all sales vouchers and information for a
minimum of 18 months.
Refunds should not be attempted once a retrieval request has been sent or a
chargeback has been processed as this may result in your settlement account
being debited twice.
8
CARD PRESENT
TRANSACTIONS
While trusting your customers is important this should not be at the good
business sense. This means ensuring that whenever the card is present staff
undertakes additional security measures to ensure the card is not a counterfeit
(fake) and that the purchase is the genuine cardholder.
While checking the above features, take note of the customer’s behavior.
Some of the below situations on their own may not cause for alarm but in
combination they could be an early indicator that something is not quite right.
9
checking the security features.
• Customers who choose an item in store and tell you that they will phone
through a card number and provide a delivery address.
• Customers who will make numerous purchases under your floor limit.
• Customers who ask you to manually key a transaction providing the card
number from memory, a slip of paper or an old sales voucher.
• Customers who need to see the card in order to sign the sales receipt.
Always attempt to insert the card into CHIP reader through your POS terminal
when the opportunity serves. Manual Key Entry of the card number greatly
increases your exposure to chargebacks as there is no proof that the card was
present during the time of transaction. For high transaction amount and/or
suspicious transaction ask for ID proof (copy of original passport or any other
photo ID which matches details with card details).
10
relationship manager will put you through to the correct person who will ask a
series of “Yes” or “No” questions. Hold on to the card if possible while making
the call.
If the operator decides something is amiss, he or she will deny authorization.
A Code 10 can be used any time when you as merchant feel that transaction
may not be legitimate, even if the transaction is approved or if the customer
had already left the premises.
11
CARD NOT PRESENT
TRANSACTIONS
For this reason it is important you understand the possible warning signals to
identify suspicious or unusual transactions for your business. We suggest that you
undertake additional security measures whenever you accept a covered/ credit
card for payment in a Card Not Present environment.
12
situations may occur during a valid transaction combinations of these may be
cause for alarm.
International Orders
We suggest that you express caution when receiving any international orders
particularly from countries you do not normally deal with or if you do not
normally trade internationally.
13
Suspicious of the Transaction?
If you cannot verify that the payment details provided are genuine or you are
suspicious of the purchaser or the transaction, ask for an alternative form of
payment such as a telegraphic transfer. If the customer refuses, we recommend
that you process a refund to the card and DO NOT send the goods.
14
authentication programs developed by the card schemes.
If data is held electronically, a merchant should comply with the Payment Card
Industry Data Security Standard (PCI DSS). The PCI DSS contains requirements
and guidelines and is endorsed by all major credit and charge card payment
brands including Visa, MasterCard, American Express, Diners, CUP and JCB.
15
How do you protect customer information?
• Ensure that all computer systems have a unique password.
• Conduct a network scan on all your external facing IP address.
• Protect systems that store and/or transmit card data with Anti-Virus
software.
• Utilize firewall with stringent and granular security rules at all entry points
Intrusion Detection Systems should be strategically placed with the network
as needed.
• Do not store Card data on Internet facing systems.
• Encrypt data maintained on database or files and any data sent across
networks.
• Securely destroy data when it is no longer needed for business reasons.
• Limit access by your employees to account data on a need-to-know basis
and remove access to your network and premises if an employee leaves your
business.
• Ensure files and transaction documentation is kept out of reach of customers.
16
unauthorized entity. This allows procedures to be implemented immediately
to reduce the usage of compromised data protecting your customers but also
reducing the potential financial losses for you and others.
Ensure your business complies with the full PCI Standards by completing the
SAQ available on any of the websites of the card schemes listed.
UNIONPAY
UPI - Union Pay International (formerly known as China Union Pay (CUP)) is a
card scheme that originates from Mainland China & operates worldwide with
acceptance and issuance ability of both Debit & Credit card ranges that can be
accepted at selected merchants across UAE and the Gulf
17
EMV CARDS
An EMV or CHIP card contains a smart chip loaded with the information
normally contained within the magnetic stripe of a card. The chip also contains
further enhanced security features which may include a PIN to complete the
transaction, making the production of counterfeit cards more difficult.
Chip cards have been introduced to limit the impact of the counterfeit card
activity and have now replaced magnetic stripe based cards which are still
vulnerable to card skimming. However, chip cards are also produced with a
magnetic strip.
AUTHORISATION
An authorization confirms the following information at the time of the
transaction:
• The card has not been reported as lost or stolen.
• There are sufficient funds to cover the purchase.
Suspicious Cardholder
If you are suspicious of:
• The cardholder
• The card
Dial the ADIB relationship manager and state “CODE 10”. (You will be
transferred to an operator who will assist you).
Remember:
• Only use ‘Code 10’ if you are suspicious of the transaction. Do not use ‘code
10’ if you simply need to obtain an authorization.
• Authorization for UPI card transactions cannot be obtained by contacting
ADIB MERCHANT SERVICES Call Center. If a transaction declines you cannot
accept the card for payment. Advise the cardholder to contact their bank.
Debit Cards and Charge Cards
Fraudulent transactions can also occur on Debit and Charge Cards (AMEX,
Diners and JCB). Ensure that you apply the pre-cautions enclosed within this
18
booklet to all Debit and Charge Card transactions.
Disclaimer: Adopting some or all of these suggestions will not guarantee that you
will not be exposed to card fraud. Your liability of card fraud is detailed in your
merchant agreement.
19
The Risks & Regulations on “Double Swiping”
“Double Swiping” is a term used in the industry to describe the act of a second swipe of a
payment card at merchant ECR terminal after the first swipe to obtain initial authorization
from the bank. This second swipe effectively exposes a payment card’s magnetic stripe full
track data to compromise.
Criminals are constantly attempting to access and compromise merchant ECRs that are not
PCI-Compliant. The double swiping activity may result in track data being captured at these
ECRs which are then used to make counterfeit cards.
Step 1: Merchant Dips or Swipes the Card for Authorisation Step 2: Merchant “Double Swipes” on a non PA-DSS Terminal
� PAN
� Card Holder Name
� No Track Data
“Merchants that have been allegedly implicated in a potential account data compromised
event may be subjected to fines and other recovery fees by ADIB. Merchants will also be
required to conduct forensics investigations by a PCI Forensic Investigator (PFI).
20
Glossary
21
format.
Chip and PIN Technology: Any technology in whatever form introduced by any Payment
Network which employs Chip embedded Cards and/or the use of a PIN in conjunction with or
in replacement of a manual signature of Cardholder.
Chip Card: A Card embedded with a Chip that communicates information to a Chip-Reading
Device.
Chip-Reading Device: A POS Device capable of reading, communicating and processing
Transaction data from a Chip Card.
Code 10 Authorization: An Authorization or an “additional verification step” obtained for a
suspicious or questionable Transaction, Card or Cardholder.
Complaint Chip Card: A chip Card that complies with all Payment Network Regulations.
Confidential Information: All information or items proprietary to any party to the
Agreement of which the other party to the Agreement obtains knowledge or access as a
result of the relationship formed as a result of the Agreement including, but not limited to
the following types of information and other information of a similar nature (whether or
not reduced to writing): scientific, technical or business information, product makeup lists,
ideas, concepts, designs, drawing, techniques, plans calculations, system designs, formulae,
algorithms, programs, software (source and object code), hardware, manuals, test procedures
and results, identity and description of computerized records, identity and description of
suppliers, customer lists, processes, procedures, trade secrets, “know-how”, marketing
techniques and materials, marketing and development plans, price lists, pricing policies, and
all other financial information.
Contactless: A payment card or key fob equipped with a chip and antenna that securely
communicates Cardholder account information via radio frequently to a POS Device.
Copy Request: Retrieval Request.
Covered/Credit Card: this includes any of the following cards or devices that are associated
to the Person to whom the card or device is issued: (i) a Visa covered/credit card or device
bearing the symbol(s) of Visa International; (ii) Master covered/ credit card or device bearing
the symbol(s) of MasterCard International Incorporated.
Credit Card Associations: (i) Visa; (ii) MasterCard; (iii) American express; (iv) Diners; (v)
UnionPay; and (viii) any other organization or association that hereafter contracts with Servicer
and/or Member to authorize, capture, and/or settle Transactions effected with Covered/
Credit Cards or signature-based Debit Cards issued or sponsored by such organization and
any successor organization or association to any of the foregoing.
Covered/Credit Card Rules: All applicable rules and operating regulations of the Credit Card
Associations, and all rules, operating regulations, and guidelines for Covered/Credit Card
Transactions issued Servicer from time to time, including, without limitation, all amendments,
charges and revision made thereto from time to time.
Credit Transaction Receipt: A document in paper or electronic form evidencing a Merchant’s
refund or price adjustment to be credited to the Cardholder’s account and debited from the
22
Merchant’s DDA. This is also known as a credit slip or credit voucher.
CVV2/CVC2: Card Verification Value .
Customer: A client of Merchant who elects to conduct a payment Transaction with Merchant
through presentation of a Payment Device (including a Cardholder).
Debit Card: A card or device bearing the symbol(s) of one or more EFT Network or Credit
Card Associations, which may be used to purchase goods and services from Merchant or
to pay an amount due to Merchant by an electronic debit to the Cardholder’s designated
deposit account. A “Debit-Card” includes (i) a card or device that bears the symbol of a Credit
card Association and may be used to conduct signature-based, offline debit transactions, and
(ii) a card or device that bears the symbol of an EFT Network and be used to conduct PIN
based, online debit transactions.
Diners: Diners Club International Ltd.
Discount: A type of fee paid by Merchant to process its Card Transactions. Discount is
calculated by multiplying the Discount rate by the volume of Card transactions.
Dynamic Currency Conversion (DCC): The conversion of the purchase price of goods or
services from the currency in which the purchase price is displayed to another currency as
agreed to by the Cardholder and Merchant. The currency becomes the Transaction currency,
regardless of the Merchant’s local currency.
EGC: Electronic Gift Card.
Electronic Commerce Transaction: A Transaction that occurs when the Cardholder uses the
Internet to make a purchase from a Merchant or Merchant uses the Internet to submit the
Transaction for processing.
Gift Card (EGC): A special card purchased by a Customer or provided by Merchant to a
Customer that is redeemable for merchandise services or other Transactions. A program that
allows a Merchant to sell Electronic Gift Cards redeemed for in-store merchandise or services.
Embossing: The process of printing data on a Card in the form of raised characters so that the
Card may be used in the imprinting of Transaction receipts.
Encryption: A security or anti-fraud technique that scrambles data automatically in the POS
Device before the data is transmitted. For example PIN’s are encrypted when transmitted for
Authorization.
High-Risk Payment Service Provider: A Payment service Provider that facilities Transactions
on behalf of high-risk Sponsored Merchants.
Hologram: A three-dimensional image include on a Card to discourage counterfeiting.
Host: The central server we use to store Merchant information and to route information
between the Merchant and the Issuers.
Issuer: The financial institution or other entity that issued and Covered/Credit Card or Debit
Card to a Cardholder.
JCB: JCB International Co., Ltd.
Laws: All applicable local, state, and federal statues, regulations, ordinances, rules and other
binding law in effect from time to time.
23
Magnetic Stripe: A stripe of magnetic material affixed to the back of a Card that contains
Cardholder account information.
Mail Order/Telephone Order (MO/TO) Transaction: For MO, a Transaction that occurs
when the Cardholder uses the mail to make a payment a Merchant and for TO, a Transaction
that occurs when the Cardholder uses a telephone to make a payment to a Merchant.
Manual Entry Authorization: An Authorization request generated when the Merchant key-
enters the Cardholder’s Card number, expiry date and sales amount into the POS Device (e.g.,
when the POS Device is unable to read the Cardholder information from the Magnetic Stripe
on the Card).The POS Device then dials out to the appropriate Authorization Center to obtain
an Authorization Code.
MasterCard: MasterCard International Incorporated.
Member: A financial institution designated by us that is a principal, sponsoring affiliate or
other member of Visa, MasterCard or other member of the applicable Payment Network. The
Member may be changed by Servicer at any time and the Merchant will be provided notice
of same.
Merchant: The business entity that provides goods and/or services to Customers.
Merchant Application: The Merchant Application and any additional document containing
information regarding Merchant’s business that is submitted to Servicer and Member
in connection with Merchant’s application for processing services, including documents
submitted by Merchant as a part of the bid process, if applicable.
Merchant Category Code (MCC): The four-digit code and corresponding definition assigned
to each Merchant that describes the type of business in which the Merchant is engaged.
Merchant Identification Number (MID): A unique identification number assigned to a
Merchant to identify its business
Merchant Statement: A summary of activity in a Merchant account.
Payment Card Industry Data Security Standard (PCI DSS): The data security regulations
including maintaining Cardholder account data in a secure environment and other data
security best practices endorsed by the major card associations including Visa and MasterCard,
as such may be amended from time to time.
Payment Device: Any device used for the purpose of obtaining credit or debiting a designated
account including a Covered/Credit Card, Debit Card, and any other financial transaction
device, including an electronic Gift Card, check (whether converted into electronic form or
used as a source document for an electronic fund transfer), stored value card, “smart” card, or
other device created to be used for the purpose of obtaining credit or debiting a designated
account, that is now or hereafter affected through Transaction with Merchants.
Payment Network: Any Covered/Credit Card Association, EFT Network, governmental
agency or authority and any other entity or association that issues or sponsors a Payment
Device.
Payment Service Provider: A merchant that is registered by Acquirer and Member with the
Payment Networks to facilitate Transactions on behalf of Sponsored Merchants.
24
Person: Any individual, firm, corporation, business trust, partnership, governmental agency
or authority or other entity and shall include any successor (by merger or otherwise) of such
entity.
Personal Identification Number (PIN): A number that must be entered by a Cardholder in
order to complete certain types of Transactions (e.g., online debit,).
PIN Pad: A secure device with an alphanumeric keyboard which conforms with the Debit
Card Rules and applicable standards administered by the Payment Card Industry Security
Standards Council and requirements establish from time to time by servicer and through
which a Cardholder may enter a PIN.
POS Device: A terminal, software, or other point-of-sale device at a Merchant location
that conforms with the requirements established by Servicer and the applicable Payment
Network.
Pre-authorized Order: A written or electronic authorization by a Cardholder allowing a
Merchant to charge his or her Card at a future date.
Prepaid Card: A card having available funds paid for in advance by the Cardholder.
Program: The Payment Device processing services and other related products and services
received by Merchant pursuant to the Agreement.
Retrieval Request: A request initiated by a Cardholder or Issuer that requires the Merchant
to produce a legible copy of the Cardholder’s signed Transaction Receipt within a specified
within a specified period of time.
Services: The entity that processes Transactions on behalf of the Merchant.
Settlement: The process of submitting Transactions to the Servicer of processing.
Site Data Protection Program (SDP): MasterCard’s data security regulations to protect
Cardholder account data and other data security best practices. The exact requirements for
SDP can be found at https://sdp.mastercardintl.com
Split Transaction: A prohibited process by which Merchants use multiple Transaction
Receipts to avoid Authorization for a single Transaction.
Transaction: Any action by a Cardholder using a Payment Device and a Merchant that results
in activity on the Cardholder’s account (e.g. payment, purchase, refund, return, or debit).
Transaction Data: All information regarding the Transaction including without limitation the
Cardholder account number, dirham amount of the Transaction and in information stored in
the Card’s Magnetic Stripe.
Transaction Date: The date that a Transaction occurs.
Transaction Receipt (Slip): The paper or electronic record evidencing the purchase of goods
or services from or payment to a Merchant by a Cardholder using a Payment Device.
UnionPay (UPI): Union Pay International
Visa: Visa International.
25
PCI Industry
The PCI DSS has 12 basic requirements that focus on using secure systems. The standards
include installing a firewall, changing default passwords, protecting stored data, using
antivirus software and encrypting transmissions of cardholder data across public networks.
The way PCI DSS relates to your business and the way in which it should be implemented
will depend on:
• The service providers you work with and their respective roles.
26
The PCI DSS requirements
By following the PCI DSS requirements you can assess if your business protects cardholder data, has
a secure network, maintains a security policy, maintains strong access control measures, regularly
monitors and tests networks, utilises a third party and if so, if they are also meeting the PCI DSS
requirements. The 12 PCI DSS requirements are as follows:
27
The benefits to your business
Any business that processes, stores or transmits cardholder account data is a potential target. It is
important for merchants to understand what measures need to be taken every day to ensure the
security of highly sensitive personal financial information.
28
How do I get started?
Visa and MasterCard have created a set of tools and resources to make PCI DSS implementation
simple and straightforward.
To learn what your specific compliance requirements are, check with your card brand compliance
program:
29
Frequently asked questions
• Annual SAQ
• Merchants processing 1 million to 6 million transactions
2 • Quarterly network scans by ASV
annually (all channels)
• Attestation of compliance
• Merchants processing 20,000 to 1 million e-commerce • Annual SAQ
3
transactions annually • Quarterly network scans by ASV
• Merchants processing less than 20,000 e-commerce • Annual SAQ
4 transactions annually, and all other merchants processing • Quarterly network scans by ASV
up to 1 million transactions annually
30
What is a vulnerability scan?
A vulnerability scan ensures that your systems are protected from external threats such as
unauthorized access, hacking or malicious viruses. The scanning tools test all of your network
equipment, hosts and applications for known vulnerabilities. Scans are intended to be non-intrusive
and are conducted by an Approved Scanning Vendor (ASV).
Regular quarterly scans are necessary to ensure that your systems and applications continue to
afford adequate levels of protection. For a list of ASVs that provide vulnerability scanning, please
visit www.pcissc.org
31
If you are at fault for a security breach, business
fallout can be severe:
• Fines and penalties
• Termination of ability to accept payment cards
• Lost confidence, so customers go to other merchants
• Lost sales
• Cost of reissuing new payment cards
• Legal costs, settlements and judgments
• Fraud losses
• Higher subsequent costs of compliance
• Going out of business
Take
Preventive Assess
Action your risk
PCI
Process
Report
32
Payment Application Data Security Standard
The PCI Payment Application Data Security Standard (PA-DSS) Requirements and Security Assessment
Procedures define security requirements and assessment procedures for software used by merchants
to process Payment Card transactions.
The PA-DSS requirements are derived from the Payment Card Industry Data Security Standard (PCI
DSS) Requirements and Security Assessment Procedures. The merchants are required to ensure the
Payment Applications used to process Payment card transactions are secure and comply with PA-DSS
standards.
Secure Payment Applications, when implemented in a PCI DSS-compliant environment, will minimize
the potential for security breaches leading to compromises of primary account number (PAN), full
track data, card verification codes and values (CAV2, CID, CVC2, CVV2), PINs and PIN blocks, and the
damaging fraud resulting from these breaches.
1. Do not retain full magnetic stripe, card validation code or value, or PIN block data.
2. Protect stored cardholder data.
3. Provide secure authentication features.
4. Log payment application activity.
5. Develop secure payment applications.
6. Protect wireless transmissions.
7. Test payment applications to address vulnerabilities and maintain payment application updates.
8. Facilitate secure network implementation.
9. Cardholder data must never be stored on a server connected to The Internet.
10. Facilitate secure remote access to payment application.
11. Encrypt sensitive traffic over public networks.
12. Encrypt all non-console administrative access.
33