Detecting Fraud On Your Own
The Fraud Tools analysis process examines dozens of different data points to assess the safety of an authorization, but there are still signs of potential fraud that have to be observed or detected by a human.
What Fraud Tools Evaluates and Examines | What Fraud Tools Does Not Evaluate or Examine |
|---|---|
Card authorization status | Spelling errors in a street name on an authorization form |
Payer’s billing ZIP code | An address using a street that doesn’t exist, or is located in a different city (1600 Pennsylvania Avenue vs 1600 Pennsylvania Street) |
The length of time a payer’s email address has been in use | A user paying with a corporate or government card, but using a free email address domain like Hotmail or Gmail |
Payer IP address | An authorization form listing the payer’s name as a fictional character, celebrity, or combination of words in a foreign language that might look like a name (Hercule Poirot, Michael Jordan, Prawo Jazdy) |
Number of recent chargebacks on the card, if any | Any information about the payer from your property management system, such as customer notes or internal flags |
Any signs of past fraudulent activity on the card | A same-day check-in, which is among the most common indicators of attempted fraud |
AVS/CVV verification | A payer signing the authorization form with gibberish text. |
Comments
0 comments
Please sign in to leave a comment.