01Mar, 2021

How secure are phone payments?

Phone payments are secure as long as the merchant receiving payments are PCI DSS compliant.

To achieve PCI DSS compliance, the merchant must ensure that the contact centre agent who is receiving the payment from a customer does not see, hear or record the customer’s credit card data. By ensuring this occurs, the customer’s credit card information remains secure from fraud due to data breach or other criminal activity.

The way PCI DSS compliance works is that the merchant must meet certain requirements for the storage, processing and transmission of credit card data. This also includes requirements for the people, processes and technologies a merchant uses to process payments.

IPSI specialise in providing enterprise’s large and small with payments technology that is PCI DSS compliant and ensure’s any phone-based payments are collected in a PCI DSS compliant manner.

A key product that allows us to do this is our contact centre solution AgentSecure®. AgentSecure® is a complete solution that enables agents and office staff to process one-off and recurring payments seamlessly in real-time without the risks associated with exposure to sensitive credit card data. With the AgentSecure® service, no credit card data enters your contact centre environment reducing PCI DSS compliance scope by 90%.

AgentSecure® ensures no credit card data is seen, heard or processed by your agents. The caller enters their card details using the phone keypad secured with DTMF Masking without any interruption to the communication channel between the agent and the customer. Ensuring a seamless customer experience, excellent service and higher payment success rates.


Related Articles

The benefits of mandatory data breach notification laws in Australia

Mandatory data breach notification laws would result in greater security for Australians and improved protection of their sensitive information. And i

Read More

Cost of data breach report (with Australian Statistics)

Ponemon Institute 2013 Cost of Data Breach report The 2013 Cost of Data Breach report published by the Ponemon Institute (sponsored by Symantec) revea

Read More

How to survive a data breach

In the past two years, LinkedIn, eHarmony, Twitter, Adobe and, most recently, Target have suffered data breaches that together exposed more than 120 m

Read More

Credit card data discovery tools lay the foundation for good data security

Card Holder Data (CHD) discovery tools are becoming essential in identifying none secure sensitive data locations. Since December 2013, a series of da

Read More