Solved

PCI Security Related: How to authenticate large credit card transactions?

Posted on 2011-02-14
3
396 Views
Last Modified: 2012-05-11
This one is a little off the beaten path for EE - but hey nothing ventured..

We take some very large credit card transactions over the phone for our services.  e.g. like $50,000 for a single transaction.  In order to authenticate the person we typically require the customer to fax in a copy of drivers license and the credit card.  I was hoping a security pro might be able to advise on another method of verifying that the customer is who they say they are and is authorized to use that particular credit card.  Thank you.
0
Comment
Question by:amigan_99
3 Comments
 
LVL 4

Accepted Solution

by:
RobertParten earned 250 total points
ID: 34890547
Have you checked with your Credit Card Processing company to see if they offer other mechanisms? A lot of banks offer a number to businesses that allows you to verify identity. Otherwise, I would check with your credit card processing company for further detail.
0
 
LVL 10

Assisted Solution

by:ChopperCentury
ChopperCentury earned 250 total points
ID: 34890698
Other than all the typical checks you would perform there is really no way to validate that the person ordering is the actual card holder. Even people who pass the AVS check and CVV code can still be fraudulant. With the volume of cash you are risking in the sale, you are being very dilligent with requiring a faxed DL. There will always be that one fraudster that gets by and when gambiling with those high transcations, you typically reflect to your organizational risk assessment for guidance.
0
 
LVL 1

Author Closing Comment

by:amigan_99
ID: 35010503
Thank you for the ideas.
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question