Category Archives: News Update

misunderstanding of scanning fees for Level 4 PCI compliance. They are much lower than many merchants think.

Hi,

For some reason many of you believe the scanning fees would be $160.00 per quarter. Many of you have told me that and I’m not sure where that came from. The fees are much, much less with our company of choice ControlScan https://www.controlscan.com/index.php sponsors of this year’s NATB show http://www.natb.org/convention/sponsors.cfm

Their typical charge for a Level 4 merchant which most of you are is only $149.00 per year. This actually includes weekly scanning and quarterly reports, it is impossible to provide a compliant quarterly scan report with only 1 scan per quarter. Also included in this service is the Self Assessment Questionnaire (has to be submitted yearly for compliance) and our Breach Protection. You can pay monthly if they like. The cost is $149/year or $15/month, so you save a bit of money if you purchase an annual membership. As I have mentioned before I receive no commissions or referral fees from them in order to keep the cost down top my merchants.
For this price there is absolutely no reason that any of you using an IP connection to enter cc orders shouldn’t be compliant. Call Andrea Butler at (800) 825-3301 or email Andrea Butler < abutler@controlscan.com>

Cheers!

Bill


Bill Hoidas
Sales Manager
Larger B2B/MOTO/Internet Accounts
Product Development Manager
Matrix Payment Systems
(847) 381-3482 office
(847) 381-4289 fax
http://paymentconsulting.net
http://chicago.citysearch.com/profile/44659273/barrington_il/matrix_payment_systems.html
John 3:16 For God so loved the world, that he gave his only begotten
Son, that whosoever believeth in him should not perish, but have
everlasting life.

You must have the CVV code (security # on your customer’s credit card)

Hi,

Recently some brokers have been told by their POS vendors that the brokers will no longer receive the CVV code on orders processed through the vendor’s POS system and/or network. The reason given is that it is a violation of MC/Visa PCI regulations. This is simply not true as security codes can be transmitted a number of different ways including secure websites or even something as simple as a fax. There is no way a ticketbroker can do business without knowing if the address and CVV are an exact match. It would be suicide to ship tickets without that knowledge plus you would be defenseless in the event of a chargeback.You absolutely need to put your foot down!

If you are facing an issue such as this and still want to enjoy the benefits of a selling group and good POS system I would suggest you contact Ticket Technology http://tickettechnology.com/ Matrix Payment Systems is by far the largest payment provider for the ticketbroker industry with almost 200 brokers as clients. Many of our brokers use Ticket Technology and they seem to be much happier with them than the other POS vendors. No I don’t get a commission or referral fee if you go there. I just think they’re a good reputable company that won’t always be trying to put the screws to you.

Contact:
Mike Young, Tech Supervisor
mike@tickettechnology.com
Ticket Technology
10000 College Boulevard
Ste 240
Overland Park , KS 66210
P: 866-543-3331
F: 913-451-1786

Good Luck,

Bill


Bill Hoidas
Sales Manager
Larger B2B/MOTO/Internet Accounts
Product Development Manager
Matrix Payment Systems
(847) 381-3482 office
(847) 381-4289 fax
http://paymentconsulting.net
http://chicago.citysearch.com/profile/44659273/barrington_il/matrix_payment_systems.html
John 3:16 For God so loved the world, that he gave his only begotten
Son, that whosoever believeth in him should not perish, but have
everlasting life.

Foreign Processing now expanded to Asia-Pacific

Hi,

Our referral source for foreign processing (Global Collect) can now setup your processing in this theater in addition to other parts of the globe.

May 12, 2008 • Issue 08:05:01
Industry Update

NEWS
GlobalCollect now in Asia-Pacific

GlobalCollect International Payment Services, an international customer-not-present e-payment solutions provider, opened an office in Singapore to serve as its regional headquarters for the Asia-Pacific market.The office will also serve as a local presence to support GlobalCollect’s portfolio of existing clients across the Asia-Pacific region which already includes Air China, PC Tools, StrawberryNET and Nespresso Asia.


Bill Hoidas
Sales Manager
Larger B2B/MOTO/Internet Accounts
Product Development Manager
Matrix Payment Systems
(847) 381-3482 office
(847) 381-4289 fax
http://paymentconsulting.net/
http://chicago.citysearch.com/profile/44659273/barrington_il/matrix_payment_systems.html
John 3:16 For God so loved the world, that he gave his only begotten
Son, that whosoever believeth in him should not perish, but have
everlasting life.

PCI compliance-are you just keeping your head in the sand until you get that big fine?

Hi,

If you process using only credit card terminal(s) utilizing dailup phone lines and don’t store credit card info on your computer than you don’t have to worry about the below. If you use any type of internet connection for your terminal, POS or gateway than this is a must read.

Bill

PCI: Is it working?

Email the Editor | Send this Article to a Friend | Print this Article

The Payment Card Industry (PCI) Data Security Standard (DSS) is complex. It includes 12 requirements and more than 200 subrequirements covering topics from technology to general security practices. And it has spawned a compliance consulting market to assist merchants who are having difficulty making heads or tails of the requirements.

The ultimate goal of the PCI DSS is to ensure cardholder data security. But after two years, one question remains: Is the job getting done? Experts disagree on the answer.

False sense of security

On Feb. 27, 2008, East Coast supermarket chain Hannaford Brothers Co., reportedly a PCI compliant business, was notified that an estimated 4.2 million credit and debit card numbers were compromised in a security breach dating back to December 2007, resulting in at least 1,800 cases of fraud. On March 17, 2008, the company posted notification on its Web site.

Carol Eleazer, Vice President of Marketing at Hannaford, said the company believed, by virtue of its PCI certification, that it had the highest standards of security in the retail industry. Until this breach, few doubted that their data would be unsafe once PCI compliance was achieved. The Hannaford case sent ripples of uncertainty throughout the industry.

Michael La Barge, President and Chief Executive Officer of Datassurant Inc., had to personally replace two credit cards as a result of the Hannaford breach. He suspected that although Hannaford believed it was PCI compliant, it probably wasn’t.

La Barge said assisting merchants in becoming PCI compliant has reached a state of competitiveness that drives the cost of an audit down and compromises thoroughness. “Some people are buying the paper that says they’re compliant, but actually ensuring compliance takes time, and it’s not usually a cut-rate deal,” he said.

“It’s worth spending a little more time and money upfront to be sure that your certification is actually backed by your security systems.”

Avivah Litan, Vice President at Gartner Inc., an information technology research company, agreed. “Focusing only on PCI compliance may limit the possibility of fines from acquiring banks, but will do nothing to prevent the much larger costs of a data breach,” she said.

So, was Hannaford truly compliant? “Until the forensics are released, it is hard to say if Hannaford was actually compliant or not,” said Bob Russo, General Manager of the PCI Security Standards Council (SSC).

“If it turns out they were, then of course, we would act immediately to change the standard to plug that hole,” Russo said. “But I don’t know of any breach in the last four or five years where the entity was totally compliant. We believe that this is the best standard in the business.”

Cost of compliance

Russo compared PCI compliance to stages of grief. At first, merchants are in denial; they don’t believe security breaches will happen to them. Then they get frustrated with the cost of becoming compliant, bargaining to use a less expensive – and less effective – tool such as a firewall. Later, after depression (stemming from the cost of new terminals and completed forms) sets in, merchants finally accept they cannot get around PCI requirements.

“Merchants starting a business didn’t used to have to think about data security much, but those days have changed,” Russo said. “Security has become an integral part of business. And, ultimately, a lot of people are becoming compliant, and they are protecting their business.”

The process of formatting an already functioning business to be PCI compliant can come with a hefty price tag. “It is much easier to build a system that is PCI compliant than it is to retrofit a legacy system to be compliant,” Russo said.

According to La Barge, small organizations may feel that reaching compliance costs more than it does for large organizations. “But in the end, the cost of not being secure can be far higher,” he said.

Litan said the average cost of compliance varies depending on the size and complexity of the businesses, and type of technological system already in place. The average spent on assessment is $175,000; all other related expenses can add up to $1.7 million.

Some recent changes to regulations are designed to make compliance easier for smaller merchants. For example, the Self Assessment Questionnaire (SAQ) version 1.1 replaced a one-size-fits-all form that forced small businesses – such as dry cleaners using dial-up or imprint machines – to address security requirements for levels 2, 3 and 4. The updated SAQ has questions specifically applicable to smaller businesses.

Card-accepting businesses that have not yet begun to demonstrate compliance can use the new SAQs, but those that have started the process must submit SAQ version 1.0 by April 30, 2008.

“PCI was designed with a particular type of large organization in mind, and it’s not very flexible,” Litan said. “The new SAQs, for example, were a long time coming, but what about all the nonretailer organizations?”

The cost of compliance doesn’t fall just on merchants’ shoulders. “We [ISOs and MLSs] hold a great responsibility, and it’s absolutely essential we protect the data we have been trusted with,” said Jared Isaacman, CEO of United Bank Card Inc. “At the same time, I do think Visa and MasterCard have to be conscientious of the various economies that take place within our industry.”

Processors and banks that purchase terminals in bulk are often left with machines they can no longer use. Some terminals released only a few years ago are no longer considered PCI compliant.

“There are ISOs, processors, banks and even merchants who have not even had a chance to realize a return on these terminal purchases before the card Associations have presently made them obsolete,” Isaacman said. “I believe there should be reasonable notice before terminal compliance mandates are enforced to protect the investments of all parties in this industry.”

Cost of noncompliance

Under PCI, if a merchant is noncompliant at the time of a breach, the merchant’s acquirer might face fines from the card companies. Further liability might include reimbursements of breach-related costs sustained by issuing banks and credit unions, which could be any fraud losses resulting from the use of compromised card data, breach notification and reissuing cards.

“Under Visa rules, if a merchant is identified as the source of the data breach, direct fraud costs initially borne by the bank can be charged back to the retailer,” Litan said. “Visa used to have a safe harbor statement on their Web site, but they’ve removed it.

“But technically, if a merchant was determined to be compliant, they shouldn’t be fined. It would be the responsibility of the bank or acquirer that signed off on the assessment. But, of course, the fine is only one factor in the costs of a security breach.”

Gartner estimated that the average cost of a response to a major security breach ranges from $80 to $312 per customer or account. “In addition to the banks pushing the costs back down to the merchants, the card brands can levy fines, increase the merchant’s processing rates, impose additional auditing requirements, and – if the merchant is not already a level 1 as Hannaford was – escalate their ranking to a level that imposes greater requirements,” La Barge said.

La Barge added that merchants face gaining a bad reputation in the industry in the aftermath of a breach. “It can be extremely costly,” he said.

“I have a handful of clients who are merchants that have run afoul of PCI standards and had security breaches and faced Visa and MasterCard fines in consequence,” said Adam Atlas, Attorney and President of the Canadian Acquirers Association.

“The fines are surprisingly large,” Atlas said. “As far as I am aware, neither Visa nor MasterCard inform merchants in advance of the precise manner in which fines are calculated so that a merchant could objectively determine the amount they might be fined for any given breach.”

According to Atlas, his clients who have been fined were under the impression that the fines were more or less discretionary fees levied by the card Associations. “Apart from being perceived as irrational and unfair, these fines create an opportunity for the Associations to seize upon a merchant with a security breach as a revenue opportunity at precisely the moment when they can least afford it,” he said.

This creates “a lack of procedural justice in the fine levying process,” Atlas said. Now that both Visa Inc. and MasterCard Worldwide are being publicly traded, for-profit enterprises, he believes the card Associations are interested in making fines for security breaches as high as possible, with no direct correlation to the financial damage caused by the breach.

“I feel bad for any merchant that is landed with an Association security breach fine,” Atlas said. “The fines are large and often crippling and without obvious and accessible right of appeal.”

Importance of validation

The PCI standards are extremely detailed and can be difficult for MLSs and merchants to decipher. According to Russo, the complexity is both the beauty and the beast of it. “Some other standards like SOX [Sarbanes-Oxley Act of 2002] are so vague that it is hard to know exactly what to do,” he said. “When you first look at the PCI standard, it seems like quite a lot. But it is very clear what is expected of you.”

When the PCI SSC was established in 2006, it anticipated approximately 50 organizations would join. There are now nearly 500 members, which Russo said helps make the standards some of the best in the industry. “These 500 organizations have a lot of data, and hackers are constantly scratching at their windows to try to get that data,” he said.

According to Visa’s Cardholder Information Security Program records, 77 percent of the largest U.S. merchants and 62 percent of medium-sized merchants validated their PCI compliance in 2007. Merchants in these two categories account for approximately two-thirds of Visa’s U.S. transaction volume.

The number of merchants validating their businesses comes as no surprise, since merchants identified as level 1 between 2004 and 2006 were required to validate by Sept. 30, 2007; those identifying at this level since 2007 have until Sept. 30, 2008. Merchants identified as level 2 between 2004 and 2006 were required to certify by Dec. 31, 2007; those identified in 2007 as level 2 have until Dec. 31, 2008.

Visa began levying monthly fines of $25,000 to U.S. merchant banks and acquirers for their respective large merchants who did not reach the deadline. As of January 2008, Visa is fining U.S. acquirers $5,000 for noncompliant mid-sized merchants.

“Visa will continue to encourage merchants to meet data security compliance requirements and to provide supporting tools and resources,” Michael E. Smith, Visa’s Senior Vice President of Enterprise Risk and Compliance, said in a statement.

“PCI DSS compliance is designed to enhance data security, which is in the best interest of merchants, consumers and the financial services industry alike.”

According to Visa, storing cardholder data is one of the riskiest practices, and more than 99 percent of large and mid-sized merchants have affirmed they do not retain prohibited account data.

However, the Hannaford breach is believed to have occurred while cardholder data was in transmission – not in storage. Still, Litan said while PCI is “an OK standard,” it is not enough. “Retailers have to have end-to-end security and need to stay informed on security practices,” she said. “But it’s not the only answer. From a security standpoint, the banks need to do their own part and not simply put it all on the retailer.”

Education setback

PCI will work if it is implemented correctly, according to Ross Federgreen, founder of CSRSI, The Payment Advisors. But there’s an obstacle to overcome: The majority of merchants who complete SAQs have little or no true assistance when dealing with the various issues involved, and they sometimes make mistakes that can turn out to be costly.

“Many of the merchants who have attempted to answer the PCI Self Assessment Questionnaire have fabricated answers simply because they understand that they must answer ‘yes’ but, again, do not understand what they are being asked,” Federgreen said. “What is clearly needed is a system to help merchants through the process in a correct and educational manner.”

Russo agreed that educating merchants can be difficult. “All of the acquirers are sending information out to their merchants, but you can send information until you’re blue in the face and you still can’t make them read it,” he said.

Some industry experts say that while the PCI standards are very detailed, understanding the PCI DSS does not mean solid security practices are comprehended.

“Education and ongoing practice of security is paramount,” La Barge said. “Compliance is just a snapshot in time. Without actively and continually practicing security, it’s all for nothing. PCI is working for those who work diligently at being truly secure and compliant, not just compliant.”

According to Litan, the Hannaford breach shows that the focus on end-to-end protection of customer data is “critical for merchants and other card-industry stakeholders.”

Although PCI is complex, and adhering to regulations can be costly, most payments professionals don’t see an alternative. “It may be an unfair system, but I think we’re pretty much stuck with it,” Litan said. “Visa doesn’t want to risk their brand with their cardholders, and breaches do alarm cardholders. PCI will continue as long as there are security breaches. And there will always be security breaches.”

Bill Hoidas

Sales Manager

Larger B2B/MOTO/Internet Accounts

Product Development Manager

Matrix Payment Systems

(847) 381-3482 office

(847) 381-4289 fax

http://paymentconsulting.net

http://chicago.citysearch.com/profile/44659273/barrington_il/matrix_payment_systems.html

John 3:16 For God so loved the world, that he gave his only begotten

Son, that whosoever believeth in him should not perish, but have

everlasting life.

PCI: Is it working?

Email the Editor | Send this Article to a Friend | Print this Article

T he Payment Card Industry (PCI) Data Security Standard (DSS) is complex. It includes 12 requirements and more than 200 subrequirements covering topics from technology to general security practices. And it has spawned a compliance consulting market to assist merchants who are having difficulty making heads or tails of the requirements.

The ultimate goal of the PCI DSS is to ensure cardholder data security. But after two years, one question remains: Is the job getting done? Experts disagree on the answer.

False sense of security

On Feb. 27, 2008, East Coast supermarket chain Hannaford Brothers Co., reportedly a PCI compliant business, was notified that an estimated 4.2 million credit and debit card numbers were compromised in a security breach dating back to December 2007, resulting in at least 1,800 cases of fraud. On March 17, 2008, the company posted notification on its Web site.

Carol Eleazer, Vice President of Marketing at Hannaford, said the company believed, by virtue of its PCI certification, that it had the highest standards of security in the retail industry. Until this breach, few doubted that their data would be unsafe once PCI compliance was achieved. The Hannaford case sent ripples of uncertainty throughout the industry.

Michael La Barge, President and Chief Executive Officer of Datassurant Inc., had to personally replace two credit cards as a result of the Hannaford breach. He suspected that although Hannaford believed it was PCI compliant, it probably wasn’t.

La Barge said assisting merchants in becoming PCI compliant has reached a state of competitiveness that drives the cost of an audit down and compromises thoroughness. “Some people are buying the paper that says they’re compliant, but actually ensuring compliance takes time, and it’s not usually a cut-rate deal,” he said.

“It’s worth spending a little more time and money upfront to be sure that your certification is actually backed by your security systems.”

Avivah Litan, Vice President at Gartner Inc., an information technology research company, agreed. “Focusing only on PCI compliance may limit the possibility of fines from acquiring banks, but will do nothing to prevent the much larger costs of a data breach,” she said.

So, was Hannaford truly compliant? “Until the forensics are released, it is hard to say if Hannaford was actually compliant or not,” said Bob Russo, General Manager of the PCI Security Standards Council (SSC).

“If it turns out they were, then of course, we would act immediately to change the standard to plug that hole,” Russo said. “But I don’t know of any breach in the last four or five years where the entity was totally compliant. We believe that this is the best standard in the business.”

Cost of compliance

Russo compared PCI compliance to stages of grief. At first, merchants are in denial; they don’t believe security breaches will happen to them. Then they get frustrated with the cost of becoming compliant, bargaining to use a less expensive – and less effective – tool such as a firewall. Later, after depression (stemming from the cost of new terminals and completed forms) sets in, merchants finally accept they cannot get around PCI requirements.

“Merchants starting a business didn’t used to have to think about data security much, but those days have changed,” Russo said. “Security has become an integral part of business. And, ultimately, a lot of people are becoming compliant, and they are protecting their business.”

The process of formatting an already functioning business to be PCI compliant can come with a hefty price tag. “It is much easier to build a system that is PCI compliant than it is to retrofit a legacy system to be compliant,” Russo said.

According to La Barge, small organizations may feel that reaching compliance costs more than it does for large organizations. “But in the end, the cost of not being secure can be far higher,” he said.

Litan said the average cost of compliance varies depending on the size and complexity of the businesses, and type of technological system already in place. The average spent on assessment is $175,000; all other related expenses can add up to $1.7 million.

Some recent changes to regulations are designed to make compliance easier for smaller merchants. For example, the Self Assessment Questionnaire (SAQ) version 1.1 replaced a one-size-fits-all form that forced small businesses – such as dry cleaners using dial-up or imprint machines – to address security requirements for levels 2, 3 and 4. The updated SAQ has questions specifically applicable to smaller businesses.

Card-accepting businesses that have not yet begun to demonstrate compliance can use the new SAQs, but those that have started the process must submit SAQ version 1.0 by April 30, 2008.

“PCI was designed with a particular type of large organization in mind, and it’s not very flexible,” Litan said. “The new SAQs, for example, were a long time coming, but what about all the nonretailer organizations?”

The cost of compliance doesn’t fall just on merchants’ shoulders. “We [ISOs and MLSs] hold a great responsibility, and it’s absolutely essential we protect the data we have been trusted with,” said Jared Isaacman, CEO of United Bank Card Inc. “At the same time, I do think Visa and MasterCard have to be conscientious of the various economies that take place within our industry.”

Processors and banks that purchase terminals in bulk are often left with machines they can no longer use. Some terminals released only a few years ago are no longer considered PCI compliant.

“There are ISOs, processors, banks and even merchants who have not even had a chance to realize a return on these terminal purchases before the card Associations have presently made them obsolete,” Isaacman said. “I believe there should be reasonable notice before terminal compliance mandates are enforced to protect the investments of all parties in this industry.”

Cost of noncompliance

Under PCI, if a merchant is noncompliant at the time of a breach, the merchant’s acquirer might face fines from the card companies. Further liability might include reimbursements of breach-related costs sustained by issuing banks and credit unions, which could be any fraud losses resulting from the use of compromised card data, breach notification and reissuing cards.

“Under Visa rules, if a merchant is identified as the source of the data breach, direct fraud costs initially borne by the bank can be charged back to the retailer,” Litan said. “Visa used to have a safe harbor statement on their Web site, but they’ve removed it.

“But technically, if a merchant was determined to be compliant, they shouldn’t be fined. It would be the responsibility of the bank or acquirer that signed off on the assessment. But, of course, the fine is only one factor in the costs of a security breach.”

Gartner estimated that the average cost of a response to a major security breach ranges from $80 to $312 per customer or account. “In addition to the banks pushing the costs back down to the merchants, the card brands can levy fines, increase the merchant’s processing rates, impose additional auditing requirements, and – if the merchant is not already a level 1 as Hannaford was – escalate their ranking to a level that imposes greater requirements,” La Barge said.

La Barge added that merchants face gaining a bad reputation in the industry in the aftermath of a breach. “It can be extremely costly,” he said.

“I have a handful of clients who are merchants that have run afoul of PCI standards and had security breaches and faced Visa and MasterCard fines in consequence,” said Adam Atlas, Attorney and President of the Canadian Acquirers Association.

“The fines are surprisingly large,” Atlas said. “As far as I am aware, neither Visa nor MasterCard inform merchants in advance of the precise manner in which fines are calculated so that a merchant could objectively determine the amount they might be fined for any given breach.”

According to Atlas, his clients who have been fined were under the impression that the fines were more or less discretionary fees levied by the card Associations. “Apart from being perceived as irrational and unfair, these fines create an opportunity for the Associations to seize upon a merchant with a security breach as a revenue opportunity at precisely the moment when they can least afford it,” he said.

This creates “a lack of procedural justice in the fine levying process,” Atlas said. Now that both Visa Inc. and MasterCard Worldwide are being publicly traded, for-profit enterprises, he believes the card Associations are interested in making fines for security breaches as high as possible, with no direct correlation to the financial damage caused by the breach.

“I feel bad for any merchant that is landed with an Association security breach fine,” Atlas said. “The fines are large and often crippling and without obvious and accessible right of appeal.”

Importance of validation

The PCI standards are extremely detailed and can be difficult for MLSs and merchants to decipher. According to Russo, the complexity is both the beauty and the beast of it. “Some other standards like SOX [Sarbanes-Oxley Act of 2002] are so vague that it is hard to know exactly what to do,” he said. “When you first look at the PCI standard, it seems like quite a lot. But it is very clear what is expected of you.”

When the PCI SSC was established in 2006, it anticipated approximately 50 organizations would join. There are now nearly 500 members, which Russo said helps make the standards some of the best in the industry. “These 500 organizations have a lot of data, and hackers are constantly scratching at their windows to try to get that data,” he said.

According to Visa’s Cardholder Information Security Program records, 77 percent of the largest U.S. merchants and 62 percent of medium-sized merchants validated their PCI compliance in 2007. Merchants in these two categories account for approximately two-thirds of Visa’s U.S. transaction volume.

The number of merchants validating their businesses comes as no surprise, since merchants identified as level 1 between 2004 and 2006 were required to validate by Sept. 30, 2007; those identifying at this level since 2007 have until Sept. 30, 2008. Merchants identified as level 2 between 2004 and 2006 were required to certify by Dec. 31, 2007; those identified in 2007 as level 2 have until Dec. 31, 2008.

Visa began levying monthly fines of $25,000 to U.S. merchant banks and acquirers for their respective large merchants who did not reach the deadline. As of January 2008, Visa is fining U.S. acquirers $5,000 for noncompliant mid-sized merchants.

“Visa will continue to encourage merchants to meet data security compliance requirements and to provide supporting tools and resources,” Michael E. Smith, Visa’s Senior Vice President of Enterprise Risk and Compliance, said in a statement.

“PCI DSS compliance is designed to enhance data security, which is in the best interest of merchants, consumers and the financial services industry alike.”

According to Visa, storing cardholder data is one of the riskiest practices, and more than 99 percent of large and mid-sized merchants have affirmed they do not retain prohibited account data.

However, the Hannaford breach is believed to have occurred while cardholder data was in transmission – not in storage. Still, Litan said while PCI is “an OK standard,” it is not enough. “Retailers have to have end-to-end security and need to stay informed on security practices,” she said. “But it’s not the only answer. From a security standpoint, the banks need to do their own part and not simply put it all on the retailer.”

Education setback

PCI will work if it is implemented correctly, according to Ross Federgreen, founder of CSRSI, The Payment Advisors. But there’s an obstacle to overcome: The majority of merchants who complete SAQs have little or no true assistance when dealing with the various issues involved, and they sometimes make mistakes that can turn out to be costly.

“Many of the merchants who have attempted to answer the PCI Self Assessment Questionnaire have fabricated answers simply because they understand that they must answer ‘yes’ but, again, do not understand what they are being asked,” Federgreen said. “What is clearly needed is a system to help merchants through the process in a correct and educational manner.”

Russo agreed that educating merchants can be difficult. “All of the acquirers are sending information out to their merchants, but you can send information until you’re blue in the face and you still can’t make them read it,” he said.

Some industry experts say that while the PCI standards are very detailed, understanding the PCI DSS does not mean solid security practices are comprehended.

“Education and ongoing practice of security is paramount,” La Barge said. “Compliance is just a snapshot in time. Without actively and continually practicing security, it’s all for nothing. PCI is working for those who work diligently at being truly secure and compliant, not just compliant.”

According to Litan, the Hannaford breach shows that the focus on end-to-end protection of customer data is “critical for merchants and other card-industry stakeholders.”

Although PCI is complex, and adhering to regulations can be costly, most payments professionals don’t see an alternative. “It may be an unfair system, but I think we’re pretty much stuck with it,” Litan said. “Visa doesn’t want to risk their brand with their cardholders, and breaches do alarm cardholders. PCI will continue as long as there are security breaches. And there will always be security breaches.”

Bill Hoidas

Sales Manager

Larger B2B/MOTO/Internet Accounts

Product Development Manager

Matrix Payment Systems

(847) 381-3482 office

(847) 381-4289 fax

http://paymentconsulting.net

http://chicago.citysearch.com/profile/44659273/barrington_il/matrix_payment_systems.html

John 3:16 For God so loved the world, that he gave his only begotten

Son, that whosoever believeth in him should not perish, but have

everlasting life.

Hi,

If you process using only credit card terminal(s) utilizing dailup phone lines and don’t store credit card info on your computer than you don’t have to worry about the below. If you use any type of internet connection for your terminal, POS or gateway than this is a must read.

PCI: Is it working?

Email the Editor | Send this Article to a Friend | Print this Article

T he Payment Card Industry (PCI) Data Security Standard (DSS) is complex. It includes 12 requirements and more than 200 subrequirements covering topics from technology to general security practices. And it has spawned a compliance consulting market to assist merchants who are having difficulty making heads or tails of the requirements.

The ultimate goal of the PCI DSS is to ensure cardholder data security. But after two years, one question remains: Is the job getting done? Experts disagree on the answer.

False sense of security

On Feb. 27, 2008, East Coast supermarket chain Hannaford Brothers Co., reportedly a PCI compliant business, was notified that an estimated 4.2 million credit and debit card numbers were compromised in a security breach dating back to December 2007, resulting in at least 1,800 cases of fraud. On March 17, 2008, the company posted notification on its Web site.

Carol Eleazer, Vice President of Marketing at Hannaford, said the company believed, by virtue of its PCI certification, that it had the highest standards of security in the retail industry. Until this breach, few doubted that their data would be unsafe once PCI compliance was achieved. The Hannaford case sent ripples of uncertainty throughout the industry.

Michael La Barge, President and Chief Executive Officer of Datassurant Inc., had to personally replace two credit cards as a result of the Hannaford breach. He suspected that although Hannaford believed it was PCI compliant, it probably wasn’t.

La Barge said assisting merchants in becoming PCI compliant has reached a state of competitiveness that drives the cost of an audit down and compromises thoroughness. “Some people are buying the paper that says they’re compliant, but actually ensuring compliance takes time, and it’s not usually a cut-rate deal,” he said.

“It’s worth spending a little more time and money upfront to be sure that your certification is actually backed by your security systems.”

Avivah Litan, Vice President at Gartner Inc., an information technology research company, agreed. “Focusing only on PCI compliance may limit the possibility of fines from acquiring banks, but will do nothing to prevent the much larger costs of a data breach,” she said.

So, was Hannaford truly compliant? “Until the forensics are released, it is hard to say if Hannaford was actually compliant or not,” said Bob Russo, General Manager of the PCI Security Standards Council (SSC).

“If it turns out they were, then of course, we would act immediately to change the standard to plug that hole,” Russo said. “But I don’t know of any breach in the last four or five years where the entity was totally compliant. We believe that this is the best standard in the business.”

Cost of compliance

Russo compared PCI compliance to stages of grief. At first, merchants are in denial; they don’t believe security breaches will happen to them. Then they get frustrated with the cost of becoming compliant, bargaining to use a less expensive – and less effective – tool such as a firewall. Later, after depression (stemming from the cost of new terminals and completed forms) sets in, merchants finally accept they cannot get around PCI requirements.

“Merchants starting a business didn’t used to have to think about data security much, but those days have changed,” Russo said. “Security has become an integral part of business. And, ultimately, a lot of people are becoming compliant, and they are protecting their business.”

The process of formatting an already functioning business to be PCI compliant can come with a hefty price tag. “It is much easier to build a system that is PCI compliant than it is to retrofit a legacy system to be compliant,” Russo said.

According to La Barge, small organizations may feel that reaching compliance costs more than it does for large organizations. “But in the end, the cost of not being secure can be far higher,” he said.

Litan said the average cost of compliance varies depending on the size and complexity of the businesses, and type of technological system already in place. The average spent on assessment is $175,000; all other related expenses can add up to $1.7 million.

Some recent changes to regulations are designed to make compliance easier for smaller merchants. For example, the Self Assessment Questionnaire (SAQ) version 1.1 replaced a one-size-fits-all form that forced small businesses – such as dry cleaners using dial-up or imprint machines – to address security requirements for levels 2, 3 and 4. The updated SAQ has questions specifically applicable to smaller businesses.

Card-accepting businesses that have not yet begun to demonstrate compliance can use the new SAQs, but those that have started the process must submit SAQ version 1.0 by April 30, 2008.

“PCI was designed with a particular type of large organization in mind, and it’s not very flexible,” Litan said. “The new SAQs, for example, were a long time coming, but what about all the nonretailer organizations?”

The cost of compliance doesn’t fall just on merchants’ shoulders. “We [ISOs and MLSs] hold a great responsibility, and it’s absolutely essential we protect the data we have been trusted with,” said Jared Isaacman, CEO of United Bank Card Inc. “At the same time, I do think Visa and MasterCard have to be conscientious of the various economies that take place within our industry.”

Processors and banks that purchase terminals in bulk are often left with machines they can no longer use. Some terminals released only a few years ago are no longer considered PCI compliant.

“There are ISOs, processors, banks and even merchants who have not even had a chance to realize a return on these terminal purchases before the card Associations have presently made them obsolete,” Isaacman said. “I believe there should be reasonable notice before terminal compliance mandates are enforced to protect the investments of all parties in this industry.”

Cost of noncompliance

Under PCI, if a merchant is noncompliant at the time of a breach, the merchant’s acquirer might face fines from the card companies. Further liability might include reimbursements of breach-related costs sustained by issuing banks and credit unions, which could be any fraud losses resulting from the use of compromised card data, breach notification and reissuing cards.

“Under Visa rules, if a merchant is identified as the source of the data breach, direct fraud costs initially borne by the bank can be charged back to the retailer,” Litan said. “Visa used to have a safe harbor statement on their Web site, but they’ve removed it.

“But technically, if a merchant was determined to be compliant, they shouldn’t be fined. It would be the responsibility of the bank or acquirer that signed off on the assessment. But, of course, the fine is only one factor in the costs of a security breach.”

Gartner estimated that the average cost of a response to a major security breach ranges from $80 to $312 per customer or account. “In addition to the banks pushing the costs back down to the merchants, the card brands can levy fines, increase the merchant’s processing rates, impose additional auditing requirements, and – if the merchant is not already a level 1 as Hannaford was – escalate their ranking to a level that imposes greater requirements,” La Barge said.

La Barge added that merchants face gaining a bad reputation in the industry in the aftermath of a breach. “It can be extremely costly,” he said.

“I have a handful of clients who are merchants that have run afoul of PCI standards and had security breaches and faced Visa and MasterCard fines in consequence,” said Adam Atlas, Attorney and President of the Canadian Acquirers Association.

“The fines are surprisingly large,” Atlas said. “As far as I am aware, neither Visa nor MasterCard inform merchants in advance of the precise manner in which fines are calculated so that a merchant could objectively determine the amount they might be fined for any given breach.”

According to Atlas, his clients who have been fined were under the impression that the fines were more or less discretionary fees levied by the card Associations. “Apart from being perceived as irrational and unfair, these fines create an opportunity for the Associations to seize upon a merchant with a security breach as a revenue opportunity at precisely the moment when they can least afford it,” he said.

This creates “a lack of procedural justice in the fine levying process,” Atlas said. Now that both Visa Inc. and MasterCard Worldwide are being publicly traded, for-profit enterprises, he believes the card Associations are interested in making fines for security breaches as high as possible, with no direct correlation to the financial damage caused by the breach.

“I feel bad for any merchant that is landed with an Association security breach fine,” Atlas said. “The fines are large and often crippling and without obvious and accessible right of appeal.”

Importance of validation

The PCI standards are extremely detailed and can be difficult for MLSs and merchants to decipher. According to Russo, the complexity is both the beauty and the beast of it. “Some other standards like SOX [Sarbanes-Oxley Act of 2002] are so vague that it is hard to know exactly what to do,” he said. “When you first look at the PCI standard, it seems like quite a lot. But it is very clear what is expected of you.”

When the PCI SSC was established in 2006, it anticipated approximately 50 organizations would join. There are now nearly 500 members, which Russo said helps make the standards some of the best in the industry. “These 500 organizations have a lot of data, and hackers are constantly scratching at their windows to try to get that data,” he said.

According to Visa’s Cardholder Information Security Program records, 77 percent of the largest U.S. merchants and 62 percent of medium-sized merchants validated their PCI compliance in 2007. Merchants in these two categories account for approximately two-thirds of Visa’s U.S. transaction volume.

The number of merchants validating their businesses comes as no surprise, since merchants identified as level 1 between 2004 and 2006 were required to validate by Sept. 30, 2007; those identifying at this level since 2007 have until Sept. 30, 2008. Merchants identified as level 2 between 2004 and 2006 were required to certify by Dec. 31, 2007; those identified in 2007 as level 2 have until Dec. 31, 2008.

Visa began levying monthly fines of $25,000 to U.S. merchant banks and acquirers for their respective large merchants who did not reach the deadline. As of January 2008, Visa is fining U.S. acquirers $5,000 for noncompliant mid-sized merchants.

“Visa will continue to encourage merchants to meet data security compliance requirements and to provide supporting tools and resources,” Michael E. Smith, Visa’s Senior Vice President of Enterprise Risk and Compliance, said in a statement.

“PCI DSS compliance is designed to enhance data security, which is in the best interest of merchants, consumers and the financial services industry alike.”

According to Visa, storing cardholder data is one of the riskiest practices, and more than 99 percent of large and mid-sized merchants have affirmed they do not retain prohibited account data.

However, the Hannaford breach is believed to have occurred while cardholder data was in transmission – not in storage. Still, Litan said while PCI is “an OK standard,” it is not enough. “Retailers have to have end-to-end security and need to stay informed on security practices,” she said. “But it’s not the only answer. From a security standpoint, the banks need to do their own part and not simply put it all on the retailer.”

Education setback

PCI will work if it is implemented correctly, according to Ross Federgreen, founder of CSRSI, The Payment Advisors. But there’s an obstacle to overcome: The majority of merchants who complete SAQs have little or no true assistance when dealing with the various issues involved, and they sometimes make mistakes that can turn out to be costly.

“Many of the merchants who have attempted to answer the PCI Self Assessment Questionnaire have fabricated answers simply because they understand that they must answer ‘yes’ but, again, do not understand what they are being asked,” Federgreen said. “What is clearly needed is a system to help merchants through the process in a correct and educational manner.”

Russo agreed that educating merchants can be difficult. “All of the acquirers are sending information out to their merchants, but you can send information until you’re blue in the face and you still can’t make them read it,” he said.

Some industry experts say that while the PCI standards are very detailed, understanding the PCI DSS does not mean solid security practices are comprehended.

“Education and ongoing practice of security is paramount,” La Barge said. “Compliance is just a snapshot in time. Without actively and continually practicing security, it’s all for nothing. PCI is working for those who work diligently at being truly secure and compliant, not just compliant.”

According to Litan, the Hannaford breach shows that the focus on end-to-end protection of customer data is “critical for merchants and other card-industry stakeholders.”

Although PCI is complex, and adhering to regulations can be costly, most payments professionals don’t see an alternative. “It may be an unfair system, but I think we’re pretty much stuck with it,” Litan said. “Visa doesn’t want to risk their brand with their cardholders, and breaches do alarm cardholders. PCI will continue as long as there are security breaches. And there will always be security breaches.”

Bill Hoidas

Sales Manager

Larger B2B/MOTO/Internet Accounts

Product Development Manager

Matrix Payment Systems

(847) 381-3482 office

(847) 381-4289 fax

http://paymentconsulting.net

http://chicago.citysearch.com/profile/44659273/barrington_il/matrix_payment_systems.html

John 3:16 For God so loved the world, that he gave his only begotten

Son, that whosoever believeth in him should not perish, but have

everlasting life.

PIN debit-are you missing additional sales & a zero discount rate?

March 10, 2008 • Issue 08:03:01

PIN-ing profits

By Scott Henry
VeriFone

A merican consumers love debit cards. And according to a recent survey by Gartner Inc., they love PIN debit more than they love signature debit. That’s a big reason why your customers should utilize consumer-friendly, secure PIN pads.

Gartner reported that an August 2007 survey of 4,500 online U.S. adults indicates consumers prefer alternative payment types that they believe are more secure.

“Despite significant marketing campaigns by banks and card issuers to steer consumers towards using debit cards with a signature – ostensibly so that the banks can earn more interchange revenue – consumers prefer entering their personal identification number (PIN) to pay for groceries with their debit card over all types of signature-based card payments, whether credit or debit,” Avivah Litan, Vice President and Distinguished Analyst at Gartner, stated in an announcement about the survey.

That’s bad news for banks that try to steer consumers to signature-based debit payments.

Merchants can’t risk losing customers to competitors who do provide a preferred payment option, You may be passing up revenue that will end up going elsewhere if you ignore this opportunity.

The 2007 Federal Reserve Payments Study, released in December 2007, found that the annual use of debit cards increased by about 10 billion payments from 2003 to 25.3 billion payments in 2006. “Debit cards now surpass credit cards as the most frequently used electronic payment type,” the Fed said.

According to data in that report, by the end of 2006 the volume of PIN debit payments was rapidly gaining on signature debit, experiencing a compound annual growth rate of 20.6%.

Growing trend

There should be plenty of incentive for merchants to put PIN acceptance on their countertops once they understand the megatrends and cost advantages.

Consumers vote with their wallets. More specifically, they vote with a primary piece of plastic carried in their wallets. Since more payments are made with debit cards than credit cards, and more consumers favor PIN authorization over signature authorization, consciously or not, they are likely to favor establishments that offer PIN debit acceptance.

How soon these trends begin to show up on a merchant’s bottom line is hard to predict, but ultimately it will result in lost sales for those who don’t offer PIN authorization. Once customers turn to a competing merchant, it’s much more expensive to win them back than it would have been to make a modest investment to retain their loyalty.

A multitude of options are available today for PIN debit acceptance. They can be relatively simple to implement, such as PIN pad peripherals that connect to existing terminals or electronic cash registers. They can be more sophisticated PIN pads with powerful processor and memory components and the capability to adapt to multiple forms of payment, including contactless.

Or, they can be sleek, ergonomic hand-over terminals with built-in PIN pads or even wireless handhelds suited to restaurant and other hospitality environments.

Tighter security

Whichever option is best for a particular merchant environment, security should be foremost among considerations. PIN pads being sold today must meet Payment Card Industry (PCI) PIN Entry Device (PED) security requirements.

Older devices in place can still be used (Pre-Visa PED systems will have to be taken out of service in 2010, according to current regulations), but there are much better alternatives available today, which should enable you to encourage replacement sales.

PEDs should accommodate consumer needs; the consumer should not have to adapt to a completely new interface in every location he or she shops.

The common thread for shoppers is, without doubt, the ATM interface. They have successfully adapted to it over the last two decades, and it doesn’t make sense for merchants to try and create new behavior.

The latest PIN pads feature large backlit displays, large keypads, programmable function keys and more in one stylish, ergonomic device.

A merchant’s countertop can become an indelible part of his or her brand. For the PIN debit customer, the card acceptance device can become an indelible part of that brand. An important part of the selling process is advising merchants on consumer sensitivities and the value of having a device that is consumer-friendly and expertly designed.

Easier money

Mega-trends and consumer brand issues aside, the profit potential of PIN debit acceptance is a factor that any merchant should be able to grasp. The difference between PIN debit and signature debit to a merchant’s bottom line is significant.

As the Boston Globe noted in a November 2007 story, “Banks prefer the credit option for debit cards because they make more money in fees.

“For a $200 transaction, for example, they make $1.99 if the customer chooses ‘credit’ and signs his or her name, according to one estimate, more than three times the 60-90 cents they make from customers who choose ‘debit’ and enter a PIN.”

First Data Corp. noted that with PIN debit payments, “electronic deposits are made to the merchant accounts automatically, simplifying daily deposit reconciliation and improving cash flow.”

A signature is also relatively easy to fake, compared to a PIN. So signature debit is much more susceptible to fraud and chargebacks.

Barring any major change in technology or consumer usage, PIN debit is on a trajectory to eclipse signature debit in the next few years. Capitalizing on buying patterns is a solid sales strategy.


Bill Hoidas
Sales Manager
Larger B2B/MOTO/Internet Accounts
Product Development Manager
Matrix Payment Systems
(847) 381-3482 office
(847) 381-4289 fax
http://paymentconsulting.net
http://chicago.citysearch.com/profile/44659273/barrington_il/matrix_payment_systems.html
John 3:16 For God so loved the world, that he gave his only begotten
Son, that whosoever believeth in him should not perish, but have
everlasting life.

Winning by the rules

Hi,

Contrary to what other processors will tell you I am here to tell you there are things you can do especially if your business is experiencing chargebacks frequently or high dollar volume chargebacks. I have recommended TransMedia for a few years and their expertise which was good to start with is getting better and better.

Winning by the rules

When it comes to chargebacks, it is typically merchants versus cardholders. And it’s tempting for ISOs and merchant level salespeople (MLSs) to take sides – favoring their clients, naturally. But there is another approach: relying on the rules.

The payments industry implemented rules and regulations so ISOs, MLSs and merchants would all understand proper procedures and adhere to them – or face the consequences of not doing so.

Even with the rules in place, however, some feel cheated or treated unfairly once fines are handed down. If people are unhappy with a policy or a decision, there are channels to go through to change or appeal it. But navigating the channels isn’t easy; who can they turn to for guidance?

Transmedia Payment Services Ltd. is a credit card chargeback loss prevention consulting firm that works with merchants, acquirers and issuers to help them understand the rules and navigate the often murky chargeback waters.

When a business is challenged with a disputed transaction, Transmedia steps in to ensure the chargeback laws and policies are properly explored and exercised. It handles approximately $5 million in chargeback case volume each month.

Start of something different

Transmedia is made up of loss prevention experts and self-proclaimed “dispute gurus.” “Our mission is to make card transactions secure by appropriately providing recourse to remedy disputed transaction for merchants, acquirers and issuers,” said Sam Neuman, Transmedia’s Director of Sales.

The company was founded in 2003 by Bernard Klein and is currently headed by Klein, Isaac Klar and Neuman. It employs a staff of 19, operating from its Brooklyn, N.Y., headquarters.

The investigative team works aggressively to find the people behind fraudulent transactions or locate missing merchandise. The team can either find the individual who will pay for the transactions or reverse chargebacks.

Transmedia started its business with just a handful of merchant clients. Over the years, many acquirers, issuers and merchants have been added to the company’s portfolio.

In fact, Transmedia has had more than 100 percent growth for four consecutive years.

Neuman attributed the business increase, in part, to the company’s uniqueness. “It’s a brand new idea,” he said.

“There are maybe two other companies that have a similar service, but they are more tailored as a basic outsourcing service and not focused or capable to handle lost chargebacks. It’s a very exciting opportunity that we bring to merchants or acquirers. They can’t lose. It’s a win-win situation.”

Transmedia provides other services, including:

* Identifying fraudulent transactions
* Disputing defective claims
* Disputing shipping and restocking fees
* Professional advice to prevent chargeback
* Professional consulting on how to meet the credit card chargeback regulations
* Merchant educational seminars

Transmedia also has two programs in pilot phases, with hopes of launching them in the summer of 2008. One trial ensures merchants for all chargeback reason codes, while the other purchases merchant chargebacks, similar to when collection firms buy debt.

Always room to improve

Transmedia is focused on the areas of card Association dispute resolution guidelines, regulations and extensive fraud investigation.

“With the expertise in these areas, we have developed procedures and methods to effectively recover and prevent definite losses to merchants, acquirers or issuers,” Neuman said. The company also serves law enforcement agencies.

Transmedia investigates all types of card-not-present transaction scams. “When we look at the pattern of a fraud claim and order, we will very easily determine what type of fraud scenario that will fall under, and whether merchandise may still be retrievable,” Neuman said.

The company stays on course with payments industry rules because it knows policies were created to better serve all payments professionals.

“Our research and practice finds the federal credit acts, as well as the bank card Association rules, to be well constructed programs with fine streamlined resolutions to assure that the most reasonable and fair results are achieved by those rules,” Neuman said.

However, Neuman pointed out that this does not mean the system is perfect. Over time, many of the rules have either been ignored or forgotten. “The only problem is that over the years, most of the useful detailed rules have been undermined, unstudied and unknown to the communities for which they were created,” he said.

Neuman wants payments professionals to know there is a problem with the way chargebacks are handled, and it is costing money. But, he also wants to inform them that something can be done about it. “ISOs and merchants are so used to the idea that a chargeback has to be paid and there is no way to reverse it,” Neuman said. “ISOs can reduce their liability. There is money out there.”

Chargebacks are, in fact, reversible and winnable. “Often you need help to initiate a chargeback, and often you need help to fight a chargeback,” Neuman said. “We are here to get into the driver’s seat to assure that reasonable justice is accomplished and to assure that all technical requirements are properly met.”

All merchants need chargeback guidance, not just those who are high risk. “Every retailer has a 5 percent return,” Neuman said. “Every card-not-present merchant has at least one-tenth of a percentage of chargebacks. There are always some instances that can’t be resolved in good faith.”

ISOs, MLSs and merchants can hire Transmedia on a case by case basis or on retainer to train staff on chargeback guidelines. Merchants don’t need to face a chargeback issue to benefit from education. The company works with merchants to help them learn procedures to prevent and fight future chargebacks.

Breaking bad habits

The company believes card issuer chargeback programs have been running out of control. “Just because a chargeback can physically be initiated by the push of a button, chargebacks should not be a dictating mechanism unless it has met appropriate and reasonable requirements before initiated,” Neuman said.

According to Neuman, the habits of cardholders and issuers have allowed such programs to be misused, and both sides are responsible. “It’s the same with the opposing side of the table,” he said. “Credit card transactions are often inappropriately initiated, causing losses for issuers and cardholders in the billions of dollars, all because the merchant was trusted with a merchant account.”

Neuman noted that in many cases, a chargeback arises when a cardholder claims the merchandise received was defective, while the merchant insists the item is adequate. In instances such as this, the issue becomes more about making a point and being right, which is not helpful for winning the dispute.

“We would typically never argue that merchandise was not defective,” Neuman said. “That’s useless. That is not going to make you win that case. You have to look into other causes.”

There are many requirements to make a chargeback valid, and it must be proved that all the rules necessary for a chargeback were followed. “If you don’t raise the appropriate cause, you are going to lose the case,” he said.

One of Transmedia’s key service features is the minimal involvement of merchants. The company can usually resolve half of its cases without merchant participation: In issues that do not involve fraud, it resolves more than 90 percent of the chargebacks; in issues of fraud, the rate is approximately 74 percent.

Referrals worth making

Transmedia works with referrals from acquirers, ISOs, MLSs and others. ISOs earn revenue by recommending the service to their merchants. Transmedia staff closes the sales, but ISOs must perform the initial introductions and offer personal recommendations.

“After we close the sale, there is nothing that we require from the ISOs to keep up, except if they stop giving us the chargeback, we may ask the ISO to call the merchant and refresh them about us,” Neuman said. Transmedia also “locks” merchants to the ISO by not servicing merchants if they decide to switch. ISOs can choose one of two compensation programs: a flat referral fee, or a 10 percent residual for the life of the account. “Depending on the frequency and the number of leads, we have different commission-based programs to sales partners,” Neuman said. “These programs can start as little as just a one-time bonus and as high as lifetime residuals.”

Whenever there is a dispute or disagreement, it can be difficult to see who is right or wrong; there is plenty of room for shades of gray. It can be helpful to have a set of rules nearby to transform those areas to black and white. But those rules are only helpful if they are properly understood and implemented.

Transmedia can help merchants, acquirers and issuers do just that. And when regulations are known and enforced, everyone wins in the long run.


Bill Hoidas
Sales Manager
Larger B2B/MOTO/Internet Accounts
Product Development Manager
Matrix Payment Systems
(847) 381-3482 office
(847) 381-4289 fax
http://paymentconsulting.net
http://chicago.citysearch.com/profile/44659273/barrington_il/matrix_payment_systems.html
John 3:16 For God so loved the world, that he gave his only begotten
Son, that whosoever believeth in him should not perish, but have
everlasting life.

Tell congress you want lower processing rates!

Hi,

Here’s your chance to tell your U.S. representatives that you’ve had enough of MC/Visa raising their rates twice every year. Time is of the essence however. So instead of just complaining about cc rate increases send this email or your own version to your congressional representative. It’s easy to find their contact info. Just go to http://www.visi.com/juan/congress/index.html and scroll down just a little bit and type in your address on the left hand side.

Interchange act coming back stronger

T hey’re angry, they’re organized and they’re being heard. No, it’s not some hardscrabble, anti-this-or-that protesters. It’s a group of merchants who have come together through such organizations as the Merchant Payments Coalition, National Association of Convenience Stores (NACS) and the National Retail Federation. They want interchange reform – yesterday. And the U.S. Congress is bowing to the pressure.

U.S. House Judiciary Chairman John Conyers, D-Mich., and Rep. Chris Cannon, R-Utah, planned to introduce the Credit Card Fair Fee Act the week of Feb. 25, 2008. The bill will ostensibly provide a mechanism by which merchants can negotiate interchange fees with MasterCard Worldwide and Visa Inc.

The legislation will also establish a panel to decide on proper interchange rates should negotiating parties be unable to reach an agreement. The panel’s decisions will be legally binding, if the act becomes law.

Congress held hearings on interchange in 2007. Retailers claimed the fees are arbitrary and exorbitant, costing merchants and consumers $40 billion per year. Visa and MasterCard assert that interchange fees are a necessary and fair cost for the services they provide. They also claim that merchants already have the right to negotiate interchange fees; merchants counter that they are completely out of the rate-setting loop.

However, the bill, which was first drafted in 2007, has been delayed, not due to lack of support, but because retailers and their representatives have swayed Congress to such a degree that interested legislators need an additional week or two to review the legislation and sign on as original cosponsors, according to John Eichberger, NACS Vice President, Government Relations. When was the last time you called Congress?


Bill Hoidas
Sales Manager
Larger B2B/MOTO/Internet Accounts
Product Development Manager
Matrix Payment Systems
(847) 381-3482 office
(847) 381-4289 fax
http://paymentconsulting.net
http://chicago.citysearch.com/profile/44659273/barrington_il/matrix_payment_systems.html
John 3:16 For God so loved the world, that he gave his only begotten
Son, that whosoever believeth in him should not perish, but have
everlasting life.

Urgent! If you have a Hypercom T7P or T7Plus terminal

Due to new security requirements in Vital/Tysys files if you are key entering a transaction you MUST press the 4th button down on the left side BEFORE entering the card #.. It will say either “EFT” or “MAIL/PH” and is right under the “reports” key.

Remember this is for Hypercom terminals only.

However no matter what type of terminal you have if it doesn’t ask you for AVS info EVERY time you key enter an order let me know.