CenPOS Certifies EMV with Chase Paymentech

CenPOS certifies to process chip-card transactions with Chase Paymentech, including Level 3 Data for corporate and purchasing cards.

MIAMI, FL (PRWEB) OCTOBER 26, 2015
CenPOS, a payment technology provider, announced today that it has certified EMV, including the processing of level 3 data, to all the card brands with Chase Paymentech. CenPOS continues to certify its payment-processing platform with world-class providers like Chase Paymentech at lightning speed. CenPOS has dedicated extensive resources to ensuring that it was EMV ready in the US and making sure it certified with as many networks as possible; therefore, giving its customers with many choices to choose from. Level III processing helps businesses reduce their cost of card acceptance on all commercial/purchasing cards accepted at their place of business. CenPOS provides level III processing capabilities to Card-present as well as card not present merchants.
“It has been our sheer determination and commitment to be the first provider to be EMV ready in the US. More importantly, we are equally passionate in making sure we bring differentiated value to our valued software partners and customers”, commented German Gonzalez Co-founder and Chief Technology Officer. “We understand the importance for our software integrators to bring an EMV certified solution to their customers and avoid the reputational and legal risk associated with a non-compliant payment solution. While others are still struggling with EMV, we are ready with various acquirers in the US like Chase Paymentech, TSYS and First Data”, added Gonzalez.
About CenPOS
CenPOS is a merchant-centric, end-to-end payments engine that drives enterprise-class solutions for businesses, saving them time and money, while improving their customer engagement. CenPOS’ secure, cloud-based solution optimizes acceptance for all payment types across multiple channels without disrupting the merchant’s banking relationships. For additional information please call 877.630.7960.

### CenPOS global sales and integrations, Christine Speedy 954-942-0483.

B2B Credit Card Payments And EMV Technology

What’s the best EMV payment technology for business to business (B2B) merchants? Once the requirements are defined for non-EDI payments, the options are limited. Whether card not present only, or a mix of retail, phone, and ecommerce, B2B payments are different.

B2B Credit Card Payment Minimum Requirements.

  • Tokenization to store credit card, and possibly check and wire data
  • Level 3 processing (significantly reduces merchant fees through lower qualified interchange rates)
  • Payment optimization to qualify transactions properly. For example, if merchant does a pre-authorization, and captures at a later date, certain rules need to be met to avoid higher non-qualified interchange rates.
  • 24/7 payment options for customers to serve multi-time zone and increase security

EMV Terminals for B2B.

There are no desktop or countertop terminals that support level III processing, and that won’t change. These terminals are programmed with the acquirer instructions via download, and less frequently, may be connected to Point of Sale (POS) software.

To meet the minimum B2B requirements, a payment gateway is required. Merchants process transactions by accessing a virtual terminal via a secure web page, or with an integrated software solution. The gateway must certify level III processing for each card brand, and EMV, and the specific terminal, for each acquirer.

For example, CenPOS has certified the Verifone MX915 to TSYS, with P2P encryption, level III processing. Most acquirers and banks support TSYS as a way to connect to their platfor; for example, First Data, Chase Paymentech, and Bank of America Merchant Services. To date, no other gateway has certified level 3 processing for retail and EMV. The difference for distributors is huge; it’s not uncommon to reduce merchant fees an average of 30%.

Pending Certifications

Exercise caution on claims of pending certifications, if the solutions provider:

  • Doesn’t have any certifications to date, after a year or more to prepare.
  • Has never had level III processing for retail certification
  • Does not offer a way to automate interchange management in a mixed retail & card not present environment, or for card not present only

 

 

 

EMV chip and pin liability shift hidden merchant risk

EMV terminal and EMV technology selection can impact merchant liability depending on chip and pin capabilities and management of them. Use this information to ask key questions before selecting an EMV solution.

Liability shift for stolen cards for MasterCard, American Express, and Discover

  • If the card is chip & sign, and the terminal is EMV only, the card issuer is liable
  • If the card is chip & pin, and the terminal is EMV only, the merchant is liable
  • If the card is chip & pin, and the terminal is EMV with pin, the issuer is liable

What if the terminal supports EMV & pin, but the customer does chip & sign? The merchant is liable.  Acquirers generally support chip and pin bypass to chip and signature. The only way to effectively manage liability is to steer customers to the action protecting the merchant.

emv fraud liabilityTerminals may be able to be programmed to disable pin bypass; First Data ships terminals with PIN bypass disabled.

  • Integrated payment gateways and and standalone virtual terminals can also drive terminals; because the terminals have no programming, the payment technology must have the capability to dynamically determine the best way to process, and prompt the consumer to the actions allowed. This is a tall order for most gateways, as they do not have that type of dynamic capability, and or, the gateway may not have the needed EMV certification. CenPOS disables the consumers ability to select signature over pin at the POS.

The entire EMV transaction process is certified. If an EMV certified terminal, including integrated or non-integrated payment gateway with terminal, doesn’t support the option to require chip and pin when the card issuer supports it, merchants need to weigh the associated financial risks.

 

NAFCU to House Small Business Committee: EMV Not a ‘Silver Bullet’ to Broader Problem of Data Security

NAFCU to House Small Business Committee: EMV Not a ‘Silver Bullet’ to Broader Problem of Data Security

Washington (Oct. 7, 2015) – State Department Federal Credit Union President and CEO Jan Roche will testify today on behalf of the National Association of Federal Credit Unions (NAFCU) before a House Small Business Committee hearing on how credit unions are protecting consumers in the payment system, the impact of the EMV transition and what steps are needed to better protect consumer financial data moving forward. Roche is telling lawmakers that EMV “is not a ‘silver bullet’ to the broader solution of data security” and is urging action from Congress to enact H.R. 2205, the “Data Security Act of 2015.”

“NAFCU urges Congress to modernize data security laws to reflect the complexity of the current environment and insist that retailers and merchants adhere to a strong federal standard in this regard,” Roche says in her prepared testimony.

Roche, whose credit union is headquartered in Alexandria, Va., is testifying before the House Small Business Committee in today’s hearing, “The EMV Deadline and What it Means for Small Businesses,” which began at 11 a.m. Eastern.

NAFCU’s Participation in Data Security and Cyber Initiatives

Roche highlights NAFCU’s involvement in various industry and government payments, data security and cyber initiatives. NAFCU is a member of the Payments Security Task Force, a diverse group of participants in the payments industry that is driving a discussion on payments system security. NAFCU is also a member of the Financial Services Sector Coordinating Council and the Financial Services Information Sharing and Analysis Center, which work on infrastructure cybersecurity.

The EMV Transition

The EMV transition deadline established by the four major U.S. credit card issuers (Mastercard, Visa, Discover and American Express) was Oct. 1 of this year. Roche says that her credit union “was an early adapter to the U.S. transition, first issuing EMV cards in June of 2012 for new cards and replacements for lost and stolen cards. Our credit card portfolio of over 28,000 cards is now 100 percent EMV.”

“It is important to note that the EMV transition in the U.S. is a voluntary one established by the market, and not a government mandate,” says Roche. Consumers remain protected in the new system as “all credit cards have zero-liability provisions for consumers, and the Electronic Funds Transfer Act limits consumer liability for any fraud on debit cards.”

A NAFCU study of its members found that a majority of credit unions are ready for the EMV transition and are issuing EMV credit cards to members as they issue new cards or replace oldmagnetic strips. “There is a greater cost for an EMV card for credit unions,” Roche says. She states that at her credit union, the cost (not including staff costs, set-up and postage) to produce a non-EMV card is approximately $3.04 and to produce a new EMV card it is approximately $5.81.

A study released by the Strawhecker Group on Sept. 17 of this year reported only 27 percent of merchants were going to meet the EMV deadline. “We believe that successful protection of the payments system requires all parties to be actively involved and hope that these businesses will work with the financial services community to recognize their role in making the payments system safer,” says Roche.

The PIN Debate

Roche discusses the debate among some that the EMV transition should have included a PIN mandate so consumers would be required to enter PINs for each transaction. “Imposing such a mandate or requirement would be unrealistic and would not be a panacea for the problem of data security,” Roche says. “It is the chip technology that makes new cards secure, not the PIN or signature.”

Roche states, “A truly secure payments system must be one that is constantly evolving to meet emerging threats and uses a wide range of dynamic authentication technologies – EMV, tokenization, encryption, biometrics and more.”

Credit Unions and Consumers Suffer from Data Breaches

A survey of NAFCU-member credit unions found that respondents were alerted to potential breaches an average of 164 times in 2014; two-thirds of respondents said they saw an increase in these alerts from 2013. In response to merchant data breaches that took place last year, 88.5 percent of credit union respondents said they notified a member; 65.4 percent issued new cards at a member’s request; and 57.5 percent placed a fraud alert on a member’s account.

“A credit union faces potential fines of up to $1 million per day for compliance violations,” says Roche. “In contrast, retailers are not covered by any federal laws or regulations that require them to protect the data and notify consumers when it is breached.”

Consumers are also the victims of data breaches. “Data security breaches are more than just an inconvenience to consumers as they wait for their plastic cards to be reissued,” says Roche. “Breaches often result in compromised card information leading to fraud losses, unnecessarily damaged credit ratings, and even identity theft.”

Credit Unions and the Gramm-Leach-Bliley Act

Credit unions and financial institutions have been subject to strict data security standards since the passage of the Gramm-Leach-Bliley Act in 1999. “Under the rules promulgated by the NCUA, every credit union must develop and maintain an information security program to protect customer data,” says Roche. “Additionally, the rules require third-party service providers that have access to credit union data take appropriate steps to protect the security and confidentiality of the information.” Roche states the “GLBA and its implementing regulations have successfully limited data breaches among credit unions.”

Preventing Future Data Breaches

NAFCU has long argued for a national data security standard for retailers and merchants similar to what credit unions already comply with under the GLBA. In addition, NAFCU has developed a number of key principles that should be considered and incorporated into the data security debate. These include:

Payment of breach costs by breached entities
National standards for safekeeping information
Data security policy disclosure
Notification of the account servicer
Disclosure of breached entity
Enforcement of prohibition on data retention
Burden of proof in data breach cases
While some have argued that voluntary industry standards should be the solution, the recently released Verizon 2015 Payment Card Industry Compliance Report found that four out of every five global companies fail to meet the widely accepted Payment Card Industry (PCI) data security standards for their payment card processing systems.

Legislative Solutions

NAFCU urges Congress to support H.R. 2205, the “Data Security Act of 2015,” introduced by Reps. Randy Neugebauer, R-Texas, and John Carney, D-Del. This bipartisan legislation “creates a national data security standard that is flexible and scalable, does not mandate static technology solutions and recognizes those who already have a working standard under the GLBA,” Roche says.

The National Association of Federal Credit Unions is the only national trade association focusing exclusively on federal issues affecting the nation’s federally insured credit unions. NAFCU membership is direct and provides credit unions with the best in federal advocacy, education and compliance assistance.www.nafcu.org.

###

Hypercom Optimum M4230 Mobile Credit Card Machine Replacement

Terminal failure? If your Equinox Hypercom Optimum M4230, 4220, 4205, or 4210 is not updated before 10/18/2015 it will fail due to an expired certificate. These terminals can be updated in the field through a 2 step download process, but waiting until the fail date will likely result in support delays.

The manufacturer certificates within the devices may be set to expire on October 19, 2015. When merchants power off or reboot their terminal at any time after this date, it will become inoperable. Don’t power off your terminal until you perform the required maintenance or upgrade to a new POS terminal.

To avoid service disruption and continue processing payments, please take these necessary steps prior to October 19:
1. Determine what version(s) of firmware resides within the terminals.
2. If the Boot version is 2009 0709 or greater (such as
2015 0227), then do nothing. If the BOOT version is lower, then download the firmware update, which takes about 30 minutes.

hypercom terminal 4220 4205 Act early, as each maintenance upgrade will require a minimum of 30 minutes..
We recommend updating to a new POS terminal that supports EMV and NFC to reduce risk and increase customer payment options.

If your company processes more than $1M annually, or has business to business mix of card present and phone orders, contact us for solutions. A new merchant account is not required. For all other businesses, contact your acquirer or salesperson for EMV terminal options that will work with your merchant account.