View Frequency Asked Question about credit card processing.
View Frequency Asked Question about credit card processing.
What hardware should I use? What software should I use?
The hardware and software you select depends on many things - industry, volume and type of transactions, type of data and reporting required, and your future plans and requirements. We can help you select a cost-effective system using the best hardware and software for your particular needs. Back to Top
What is Your Discount Rate?
The discount rate is the percentage charged a merchant for credit card transactions Per Item and/or authorization fee are also charged. these fees can be separated or sometimes included (bundled) into the discount rate.
Back to Top
What is Interchange?
Visa and MasterCard charge a processing or "interchange" fee on every sale. Interchange is paid to the cardholder's issuing institution. The type of card presented, the type of business that is accepting the card, and the card-processing environment determine this fee. Interchange provides revenue to the issuing bank, not the merchant processor. All processors must pay the same interchange rates. Interchange is usually applied as a percentage of the transaction amount and a per-item fee.
Back to Top
What is Dues & Assessment?
For all bankcard transactions, Dues & Assessment are paid to the Visa and MasterCard associations for bankcard transactions. This provides no revenue to acquirers/banks and all acquirers/banks pay the same Dues & Assessments.
Back to Top
How can I get the lowest interchange rate?
For the average merchant, interchange is based on Industry. To achieve the lowest interchange rate, the card must first be present with a valid magnetic stripe which is read by the terminal. Secondly, every sale should always be deposited and settled daily. If the card is not present or the terminal cannot read the magnetic stripe, then the next lowest interchange level requires the cardholders billing address to be entered via the AVS (Address Verification System) feature. For the non-traditional retailer, contact Tinadre for further solutions and software to help reduce your interchange expense.
Back to Top
What is an Authorization, and how does it work?
Authorizing a transaction protects you against fraudulent card use and confirms the cardholder's account is valid and within the available spending limit. Authorizations are obtained electronically through a point-of-sale device or through a voice authorization over the telephone.
Back to Top
What is a Retrieval Request?
A Retrieval Request is the cardholder's issuing bank request for a copy of an original sales draft. This issuer uses this request to resolve a disputed transaction or fulfill a cardholder inquiry. A Retrieval Request is a non-monetary request for information and the merchant's checking account is not debited.
Back to Top
What is a Chargeback?
A chargeback is a dispute originated by a cardholder or the cardholder's issuing bank. A chargeback is a monetary request for the amount of the dispute and is subsequently debited from the merchant's deposit account. The acquirer provides merchants with operating procedures to assist in properly accepting credit cards, helping protect them against Chargeback's.
- Amount of the charge
- Cardholder did not participate in the transaction or sale
- Performance and/or quality of the merchandise or services
- Delivery of the merchandise and/or services
- Breach of any term, condition, representation, or warranty of the transaction
- Duplicate Charge
- Non-Receipt of merchandise
Back to Top
What is Phishing? - Protecting your Merchant Account from Unauthorized Intrusion Tinadre Inc and First Data rigorously protects the privacy of our customers. It is our strict policy to never request sensitive account information such as account numbers, user names or passwords via unsecured channels such as e-mail. Any e-mail you receive that asks for account information should be treated as unauthorized and should not be given a response. This type of unauthorized request is called phishing. What is Phishing?, Online phishing (pronounced "fishing") is an attempt to trick someone into revealing personal or financial information online. Phishers use phony Web sites or deceptive e-mail messages that mimic trusted businesses and brands to steal protected information such as user names, passwords and credit card numbers. While we continue to take every possible step to prevent such attacks, responsibility also rests on each business to educate its employees on these scams to reduce risk and avoid becoming a victim. Please follow these steps if you, anyone in your organization has doubts about an email relevant to payment processing or receives a phishing email that claims to come from Tinadre Inc or First Data.
- If you are sent a questionable e-mail, do not respond or click on any links.
- If you have received a phishing e-mail marked from Tinadre Inc or First Data and has already responded with information, contact us immediately.
Here are additional tips to help your organization protect against phishing attempts.
- Be defensive with your personal and company information.
- Evaluate all communications carefully.
- Be suspicious of every request for proprietary information unless initiating a transaction yourself.
- Be wary of clicking links in e-mail messages and instant messages.
- Remember phishing sites can look extremely realistic. Bona fide organizations rarely initiate online requests for such information.
- Use extreme caution when providing sensitive data, especially in an e-mail message, instant message or pop-up window.
- Navigate directly to trusted Web sites by entering the URL in the browser Address Bar, rather than navigating through embedded hyperlinks.
- Check to see if there is HTML (unlikely in an authentic communication) or other errors (spelling, grammar).
- When you are entering personal or financial information on a Web site, check the security certificate and/or make sure the site utilizes Secure Hypertext Transfer Protocol (represented by a Web address prefix of "https").
Back to Top
|