Peace of mind for you and your customers.

The secure processing of EMV payments is part of our daily life. All companies that accept, process, store or transmit credit or debit card information must comply with the Payment Card Industry Data Security Standard (PCI DSS) and maintain a secure environment.  Protecting sensitive card data is of paramount importance to avert fraudulent activity, generate consumer trust and safeguard brand reputation.

Our infrastructure is hosted in a PCI level 1 environment. This means we conform to yearly on-site reviews by an auditor and a network scan by an approved scanning vendor.

We can reduce your PCI DSS scope by removing the need for card holder data to enter your systems while still providing you with sufficient information to fully serve your customers and analyze sales. Card holder data is defined as :

  • Primary Account Number (PAN)
  • Card holder name
  • Expiry date and service code

Sensitive authentication data, which must also be protected, includes full magnetic stripe data, CAV2, CVC2, CVV2, CID, PINs, PIN blocks and more.

Our solution is PCI Point-to-Point-Encryption (P2PE) ready. It protects sensitive payment card data from the point that it is read at the terminal through transit to the payment processor. This prevents fraudsters from being able to steal card data while in transit or storage thereby providing customer peace of mind and reducing the PCI burden on merchants.

With our 3C Vault tokenization service, payment card data is securely held in our central repository and replaced with tokenized PAN data for storage in your ERP for future reference, refunds, late charges or charge back resolution. Transactions can be securely started in one channel and recalled in another including pre-authorisations and reversals. The 3C Vault also supports card on file accounts for ‘one click’ payments that boost conversion rates and facilitate recurring payments for subscriptions.

We believe that to implement effective fraud control you must first understand the potential threat. That’s why we work with our customers to conduct system reviews and root cause analysis that can be used to implement fraud controls without negatively impacting genuine customers.