4(b)(1)
Issuer Standards 1. An issuer’s policies
and procedures should address fraud related to debit card use by unauthorized
persons. Examples of use by unauthorized persons include, but are
not limited to, the following:
i. A thief steals a cardholder’s wallet
and uses the debit card to purchase goods, without the authority of
the cardholder.
ii.
A cardholder makes a purchase at a merchant. Subsequently, the merchant’s
employee uses information from the debit card to initiate a subsequent
transaction, without the authority of the cardholder.
iii. A hacker steals cardholder account
information from the issuer or a merchant processor and uses the stolen
information to make unauthorized card-not-present purchases or to
create a counterfeit card to make unauthorized card-present purchases.
2. An issuer’s policies and procedures
must be designed to reduce fraud, where cost effective, across all
types of electronic debit transactions in which its cardholders engage.
Therefore, an issuer should consider whether its policies and procedures
are effective for each method used to authenticate the card (e.g.,
a chip or a code embedded in the magnetic stripe) and the cardholder
(e.g., a signature or a PIN), and for different sales channels (e.g.,
card-present and card-not-present).
3. An issuer’s
policies and procedures must be designed to take effective steps to
reduce both the occurrence of and costs to all parties from fraudulent
electronic debit transactions. An issuer should take steps reasonably
designed to reduce the number and value of its fraudulent electronic
debit transactions relative to its non-fraudulent electronic debit
transactions. These steps should reduce the costs from fraudulent
transactions to all parties, not merely the issuer. For example, an
issuer should take steps to reduce the number and value of its fraudulent
electronic debit transactions relative to its non-fraudulent transactions
whether or not it bears the fraud losses as a result of regulations
or network rules.
4. For any given issuer, the
number and value of fraudulent electronic debit transactions relative
to non-fraudulent transactions may vary materially from year to year.
Therefore, in certain circumstances, an issuer’s policies and procedures
may be effective notwithstanding a relative increase in the transactions
that are fraudulent in a particular year. However, continuing increases
in the share of fraudulent transactions would warrant further scrutiny.
5. In determining which fraud-prevention technologies
to implement or retain, an issuer must consider the cost-effectiveness
of the technology, that is, the expected cost of the technology relative
to its expected effectiveness in controlling fraud. In evaluating
the cost of a particular technology, an issuer should consider whether
and to what extent other parties will incur costs to implement the
technology, even though an issuer may not have complete information
about the costs that may be incurred by other parties, such as the
cost of new merchant terminals. In evaluating the costs, an issuer
should consider both initial implementation costs and ongoing costs
of using the fraud-prevention method.
6. An issuer
need not develop fraud-prevention technologies itself to satisfy the
standards in section 235.4(b). An issuer may implement fraud-prevention
technologies that have been developed by a third party that the issuer
has determined are appropriate under its own policies and procedures.
4(b)(2) Elements of Fraud-Prevention
Policies and Procedures 1. In general. An issuer may tailor its policies and procedures
to address its particular debit card program, including the size of
the program, the types of transactions in which its cardholders commonly
engage, fraud types and methods experienced by the issuer, and the
cost of implementing new fraud-prevention methods in light of the
expected fraud reduction.
Paragraph 4(b)(2)(i)—Methods to Identify and Prevent Fraudulent Debit
Card Transactions 1. In general. Examples of policies and procedures
reasonably designed to identify and prevent fraudulent electronic
debit transactions include the following:
i. Practices to help determine whether
a card is authentic and whether the user is authorized to use the
card at the time of a transaction. For example, an issuer may specify
the use of particular authentication technologies or methods, such
as dynamic data, to better authenticate a card and cardholder at the
time of the transaction, to the extent doing so does not inhibit the
ability of a merchant to direct the routing of electronic debit transactions
for processing over any payment card network that may process such
transactions. (See section 235.7 and commentary thereto.)
ii. An automated mechanism
to assess the risk that a particular electronic debit transaction
is fraudulent during the authorization process (i.e., before the issuer
approves or declines an authorization request). For example, an issuer
may use neural networks to identify transactions that present increased
risk of fraud. As a result of this analysis, the issuer may decide
to decline to authorize these transactions. An issuer may not be able
to determine whether a given transaction in isolation is fraudulent
at the time of authorization, and therefore may have implemented policies
and procedures that monitor sets of transactions initiated with a
cardholder’s debit card. For example, an issuer could compare a set
of transactions initiated with the card to a customer’s typical transactions
in order to determine whether a transaction is likely to be fraudulent.
Similarly, an issuer could compare a set of transactions initiated
with a debit card and common fraud patterns in order to determine
whether a transaction or future transaction is likely to be fraudulent.
iii. Practices to support
reporting of lost and stolen cards or suspected incidences of fraud
by cardholders or other parties to a transaction. As an example, an
issuer may promote customer awareness by providing text alerts of
transactions in order to detect fraudulent transactions in a timely
manner. An issuer may also report debit cards suspected of being fraudulent
to their networks for inclusion in a database of potentially compromised
cards.
Paragraph
4(b)(2)(ii)—Monitoring of the Issuer’s Volume and Value of Fraudulent
Electronic Debit Transactions 1. Tracking
its fraudulent electronic debit transactions over time enables an
issuer to assess whether its policies and procedures are effective.
Accordingly, an issuer must include policies and procedures designed
to monitor trends in the number and value of its fraudulent electronic
debit transactions. An effective monitoring program would include
tracking issuer losses from fraudulent electronic debit transactions,
fraud-related chargebacks to acquirers, losses passed on to cardholders,
and any other reimbursements from other parties. Other reimbursements
could include payments made to issuers as a result of fines assessed
to merchants for noncompliance with Payment Card Industry (PCI) Data
Security Standards or other industry standards. An issuer should also
establish procedures to track fraud-related information necessary
to perform its reviews under section 235.4(b)(3) and to retain and
report information as required under section 235.8.
Paragraph 4(b)(2)(iii)—Appropriate Responses
to Suspicious Electronic Debit Transactions 1. An issuer may identify transactions that it suspects
to be fraudulent after it has authorized or settled the transaction.
For example, a cardholder may inform the issuer that the cardholder
did not initiate a transaction or transactions, or the issuer may
learn of a fraudulent transaction or possibly compromised debit cards
from the network, the acquirer, or other parties. An issuer must implement
policies and procedures designed to provide an appropriate response
once an issuer has identified suspicious transactions to reduce the
occurrence of future fraudulent electronic debit transactions and
the costs associated with such transactions. The appropriate response
may differ depending on the facts and circumstances, including the
issuer’s assessment of the risk of future fraudulent electronic debit
transactions. For example, in some circumstances, it may be sufficient
for an issuer to monitor more closely the account with the suspicious
transactions. In other circumstances, it may be necessary to contact
the cardholder to verify a transaction, reissue a card, or close an
account. An appropriate response may also require coordination with
industry organizations, law enforcement agencies, and other parties,
such as payment card networks, merchants, and issuer or merchant processors.
Paragraph 4(b)(2)(iv)—Methods
to Secure Debit Card and Cardholder Data 1. An issuer must implement policies and procedures designed to secure
debit card and cardholder data. These policies and procedures should
apply to data that are transmitted by the issuer (or its service provider)
during transaction processing, that are stored by the issuer (or its
service provider), and that are carried on media (e.g., laptops, transportable
data storage devices) by employees or agents of the issuer. This standard
may be incorporated into an issuer’s information security program,
as required by section 501(b) of the Gramm-Leach-Bliley Act.
4(b)(3) Review of and Updates to Policies
and Procedures 1.
i. An issuer’s assessment of the effectiveness
of its policies and procedures should consider whether they are reasonably
designed to reduce the number and value of fraudulent electronic debit
transactions relative to non-fraudulent electronic debit transactions
and are cost effective. (See comment 4(b)(1)-3 and comment
4(b)(1)-5).
ii. An
issuer must also assess its policies and procedures in light of changes
in fraud types (e.g., the use of counterfeit cards, lost or stolen
cards) and methods (e.g., common purchase patterns indicating possible
fraudulent behavior), as well as changes in the available methods
of detecting and preventing fraudulent electronic debit transactions
(e.g., transaction monitoring, authentication methods) as part of
its periodic review of its policies and procedures. An issuer’s review
of its policies and procedures must consider information from the
issuer’s own experience and that the issuer otherwise identified itself;
information from payment card networks, law enforcement agencies,
and fraud-monitoring groups in which the issuer participates; and
supervisory guidance. For example, an issuer should consider warnings
and alerts it receives from payment card networks regarding compromised
cards and data breaches.
2. An issuer
should review its policies and procedures and their implementation
more frequently than annually if the issuer determines that more frequent
review is appropriate based on information obtained from monitoring
its fraudulent electronic debit transactions, changes in the types
or methods of fraud, or available methods of detecting and preventing
fraudulent electronic debit transactions. (See section 235.4(b)(1)(ii)
and commentary thereto.)
3. In light of an issuer’s
review of its policies and procedures, and their implementation, the
issuer may determine that updates to its policies and procedures,
and their implementation, are necessary. Merely determining that updates
are necessary does not render an issuer ineligible to receive or charge
the fraud-prevention adjustment. To remain eligible to receive or
charge a fraud-prevention adjustment, however, an issuer should develop
and implement such updates as soon as reasonably practicable, in light
of the facts and circumstances.