With the rapid expansion of
credit card business and the intension of competition, the recent complaints
about credit cards all over the country, disputes, cases of frequent,
especially in the online payment gateway current situation of the economic downturn, the credit card
business risk in multiple, high incidence of At present, various types of fraud
risks in the risk of overall credit card business has become the greatest
threat, especially the false application, and often the card-issuing banks keep
track of. It can be said that the credit card anti-fraud is a systematic
project. Overall, the fraudulent transactions can be divided into a false
application, not Dhaka, account theft, merchant fraud, stolen cards,
counterfeit cards, cardholder fraud, seven types.
1. False application
Refers to the use of false identities or without the consent of the fraudulent use of another person's identity to obtain bank card transactions for goods or services deceptive conduct. When the issuing bank to confirm that the card under the transaction took place, the cardholder affirm never applied for a bank card or submitted by the issuing bank confirms the cardholder information is forged is identified as a false application.
Refers to the use of false identities or without the consent of the fraudulent use of another person's identity to obtain bank card transactions for goods or services deceptive conduct. When the issuing bank to confirm that the card under the transaction took place, the cardholder affirm never applied for a bank card or submitted by the issuing bank confirms the cardholder information is forged is identified as a false application.
2. Not Dhaka
Refers to the cardholder submitted did not receive a bank card or affirm not open the card (card enabled), the card transaction is identified as a fraudulent transaction is not Dhaka. Not Dhaka risk prevention work, the bank should be run through the card production, storage, mailing, delivery, activation of issuing various links.
Refers to the cardholder submitted did not receive a bank card or affirm not open the card (card enabled), the card transaction is identified as a fraudulent transaction is not Dhaka. Not Dhaka risk prevention work, the bank should be run through the card production, storage, mailing, delivery, activation of issuing various links.
3. Account theft
Refers to fraud to obtain some or all of the real cardholder information, and the fake and the real cardholder card account information to make changes in order to achieve a fraudulent purpose.To guard against such risks, banks should make changes on the host system in the cardholder address, passwords and other sensitive information, first change the authenticity of the information the applicant to judge, and carefully check the customer application must be to ensure that The identity of the cardholder for the operating premise.
Refers to fraud to obtain some or all of the real cardholder information, and the fake and the real cardholder card account information to make changes in order to achieve a fraudulent purpose.To guard against such risks, banks should make changes on the host system in the cardholder address, passwords and other sensitive information, first change the authenticity of the information the applicant to judge, and carefully check the customer application must be to ensure that The identity of the cardholder for the operating premise.
4. The income of a single
business merchant fraud
Types of fraud malicious collapse of merchant fraud, false businesses, wash a single letter, telephone, internet marketing fraud, merchant cash skimming, card number of test fraud.To guard against such risks, the first visits to check on the merchants, the focus on examination of the merchant whether to increase or change of business content, the existence of the moving machine behavior, with or without access to a suspicious device. Second, we must strengthen the monitoring of transactions to merchants, pay attention to the analysis of comparative merchants trading frequency change. In addition, strengthening of risk education and skills training to the businesses, effectively prevent the acquiring fraud.
Types of fraud malicious collapse of merchant fraud, false businesses, wash a single letter, telephone, internet marketing fraud, merchant cash skimming, card number of test fraud.To guard against such risks, the first visits to check on the merchants, the focus on examination of the merchant whether to increase or change of business content, the existence of the moving machine behavior, with or without access to a suspicious device. Second, we must strengthen the monitoring of transactions to merchants, pay attention to the analysis of comparative merchants trading frequency change. In addition, strengthening of risk education and skills training to the businesses, effectively prevent the acquiring fraud.
5. Stolen card
Without the authorization or consent, fraudulent use or theft of cardholder lost bank card for fraudulent transactions. The card-issuing bank received a report the loss of application submitted by the cardholder, the bank card statement or phone is stolen report the loss after the commencement of the card under the transaction is identified as stolen card fraud transactions.To avoid the occurrence of the stolen card fraud, for the issuing bank, the main should guide the cardholder to establish the correct card awareness and self-protection awareness.
Without the authorization or consent, fraudulent use or theft of cardholder lost bank card for fraudulent transactions. The card-issuing bank received a report the loss of application submitted by the cardholder, the bank card statement or phone is stolen report the loss after the commencement of the card under the transaction is identified as stolen card fraud transactions.To avoid the occurrence of the stolen card fraud, for the issuing bank, the main should guide the cardholder to establish the correct card awareness and self-protection awareness.
6. Counterfeit cards
Means in accordance with the bank card's magnetic stripe information format to write the magnetic convex (flat) and India forged a true, valid bank card transaction fraud. Cardholder statement has been held by a bank card, to deny transactions under the card number or credit card issuers to confirm the card number never issued account transaction occurs, that is identified as counterfeit credit card fraud.
Basic types of fraud that have: account generated fraud, "clone" card fraud "white card" fraud, or altered card fraud.
Means in accordance with the bank card's magnetic stripe information format to write the magnetic convex (flat) and India forged a true, valid bank card transaction fraud. Cardholder statement has been held by a bank card, to deny transactions under the card number or credit card issuers to confirm the card number never issued account transaction occurs, that is identified as counterfeit credit card fraud.
Basic types of fraud that have: account generated fraud, "clone" card fraud "white card" fraud, or altered card fraud.
7. Cardholder fraud
Refers to the legitimate cardholder deny the behavior of their bank card account transactions. Usually two legitimate cardholder exchange bank online payment solution card and use each other's cards for consumption in different cities, to cause the illusion they did not use a bank card.This type of fraud is difficult to identify, by the moral hazard, banks should do a good job the the cardholder integrity education at the same time, strengthen monitoring efforts brought to the disputed account, through the Economic Investigation Department and other ways to trace.
Refers to the legitimate cardholder deny the behavior of their bank card account transactions. Usually two legitimate cardholder exchange bank online payment solution card and use each other's cards for consumption in different cities, to cause the illusion they did not use a bank card.This type of fraud is difficult to identify, by the moral hazard, banks should do a good job the the cardholder integrity education at the same time, strengthen monitoring efforts brought to the disputed account, through the Economic Investigation Department and other ways to trace.
No comments:
Post a Comment