echemi logo
Product
  • Product
  • Supplier
  • Inquiry
    Home > Coatings News > Paints and Coatings Market > During the National Day holiday, remember to protect your bank card when you spend outside!

    During the National Day holiday, remember to protect your bank card when you spend outside!

    • Last Update: 2021-05-02
    • Source: Internet
    • Author: User
    Search more information of high quality chemicals, good prices and reliable suppliers, visit www.echemi.com
    5em; font-size: 12px; width: auto; overflow: hidden; text-overflow: ellipsis; white-space: nowrap; word-wrap: normal; max-width: none; color: rgb(140, 140, 140);">2014-09-30 Origin Show Net Origin Show Net

    Xiaohui said: During the National Day holiday, the opportunities for traveling and spending abroad have also greatly increased.



    First of all, I will share with you a few real cases that have been closed by the court, including the loss of credit card and fraudulent use, signature handwriting identification is inconsistent, but the cardholder still has to bear part of the responsibility! As well as the obvious counterfeit card consumption situation of short-term consumption in different places, the cardholder must also bear the responsibility of not protecting the password! So, let's take a look at how to prevent it!

    □If the credit card is stolen and used fraudulently, should the merchant be responsible for the loss, or should the cardholder be responsible for the loss?

    Facts: Mr.


    Dispute: The merchant’s obligation is to check whether the signature on the purchase order is consistent with the signature on the back of the credit card.


    Referee: For the loss of 10,538 yuan, Mr.


    Judge's interpretation: Merchants are obligated to verify the identity of the customer, the content on the card, and whether the signature of the purchase order is consistent with the signature reserved on the back of the card when the customer spends with a credit card.


    Core reminder: Pay attention to large orders and separate card storage.


    □The deposit is missing, and the ATM machine is surprised to find a "stealer".


    Case: 2008 Nian 8 Yue 11 days, Mr.


    Dispute: Does the stolen bank card of Mr.


    Judge: The bank compensated Mr.


    Judge's interpretation: If it is because the bank card is lost and a third person goes to steal it with a real bank card, then the cardholder may bear part of the responsibility for improper custody; but if it can be proved that the cardholder is operating on the bank's ATM machine, If the relevant information and password are copied by unknown objects and the funds in the card are stolen, then the bank will lose the supervision of its ATM and assume the main responsibility.


    Core reminder: Regular inspections are very important, and unidentified objects are carefully identified.


    □ The card has not been left, but the consumption takes place in a different place.


    Fact: Ms.


    Dispute: The credit card regulations stipulate that all transactions conducted with a password shall be deemed as my own.


    Judge: The bank and Ms.


    Judge's interpretation: To use a credit card for consumption and cash withdrawal, two conditions are indispensable: one is to have a legal and valid credit card; the other is to have a correct and effective password.
    Both are equally important.
    Banks have the obligation to ensure security and carefully review credit cards; cardholders have the obligation to keep passwords carefully.
    Within an hour and a half, the cardholder and the credit card are in Guangzhou, and the consumption takes place in Macau, which is different from normal consumption.
    In the absence of evidence to the contrary, it can be confirmed that the consumption and cash withdrawals in Macau are made with counterfeit cards.
    ICBC, as the card issuing bank, accepted illegally copied bank card transactions and failed to perform its duty of careful review and should be held responsible for the fault.
    On the other hand, the cardholder Ms.
    Qiu, the transaction password is set and kept by the cardholder.
    Unless there is evidence that the password is leaked due to bank reasons, the risk of loss due to the leak of the password should be borne by the cardholder.
    Ms.
    Qiu also has the fault of not keeping the password properly, and she also has to bear certain responsibilities.

    :,。,、。,、KTV,,。,,ATM。


    ,,,,!

    :,

    ,,,。

    ,:、;;。,,,。

    ,,,。,,。

    ●●

    “,,,。”,。,IC,。“!”

    :、,

    ,,、。、,,,5000。

    “,。”,,,。“、,,。”

    ●●

    ,,、,、。

    ,,。,。,,。

    :“”

    8259,,,。

    ,,。,,,6,。

    ,,。

    1026,,1。

    ●●

    1、。

    2、。,。,。

    3、,,、。

    4、。,。,,,,,。

    812,,。

    ,,、。,,,。

    。,。,。

    According to the analysis of the police, it is similar to this situation.
    Generally, criminals use computer means to plant Trojan horse viruses on the victim's mobile phone, transfer the money in the victim's bank card to a third-party transaction platform, and block the consumption reminder text messages.
    As a result, the victim's bank card was swiped and the text message could not be received, resulting in the victim's later discovery of the stolen property.

    ●Correct handling method●

    1.
    Download mobile phone software through a safe and reliable application market, and try not to click on unknown software and advertisements.

    2.
    Do not log in to various spam websites without security guarantees.
    Once you find that there is unknown software in your mobile phone, you must delete it as soon as possible.
    If you cannot delete it, you can go to the mobile phone store to flash the machine with ROOT permission.

    3.
    If you are stolen, you should report to the local public security agency immediately.

    Case 5: Shopping orders were frozen bank kamo name drop of nearly 1 Wan

    7 Yue 21 Ri Xiawu 6 points of a bank employee Wu District Ms.
    Lu received a text message indicating what its purchase orders due to system upgrades lead to freeze, to be 2 dozen handle customer service calls within hours of artificial refund.

    Ms.
    Lu did not doubt and dialed the number provided in the text message.
    The person who answered the call claimed to be the customer service staff of the shopping website.
    She verified Ms.
    Lu's ID number, the bank card number used for consumption, and the reserved mobile phone number, and asked Ms.
    Lu to tell her mobile phone verification code.

    After the verification text message was sent, Ms.
    Lu saw that it was a text message deducting money from a shopping website and became suspicious.
    She asked the customer service: "Why do I have to pay for a refund?" The other party said that this is a virtual account with a system upgrade, and then the money will be returned to the customer.
    This sentence dispelled Ms.
    Lu's suspicion, and Ms.
    Lu reported the verification code to the other party without much thought.
    Successively, this step was carried out 4 times.

    6 Dian 30 points, Ms.
    Lu has found his account to pay 9895 yuan, and asked each other: "I just bought a 65 ? Yuan things, why pay so much money 'shirk a variety of other use, and finally hang up the phone, Ms.
    Lu knew that she had been deceived.

    ●Correct handling method●

    1.
    If online shopping buyers encounter similar situations, they should first check whether their purchase orders are normal.
    If you have any questions, then contact the seller to verify the order status through the official contact tool of the shopping website.
    Don't trust the content of the unknown SMS, so as to avoid losses by mistakenly logging on the phishing website.

    2.
    If you are unfortunately deceived, you should immediately report the case to the public security organ, and quickly go to the bank to go through the account freezing procedure accompanied by the police to prevent the suspect from transferring and withdrawing funds.

    3.
    If you can accurately provide the bank card number suspected of fraud, you can call the bank customer service phone of the suspected bank card to check the account opening location of the card, and quickly go to the business outlet to check the flow of funds; if the bank card number cannot be accurately provided, you can go to the bank counter Use your ID and bank card to check the scammer's account number.
    Dial the customer service number of the bank to which the fraudulent account belongs, follow the voice prompts, enter the fraudulent account, and then repeat the wrong password 5 times to freeze the fraudulent account.

    Xiaohui said: During the National Day holiday, the opportunities for traveling and spending abroad have also greatly increased.
    Xiaohui will tell you a few real case stories about the security of bank card swiping, let's take a look and learn the lessons, and use science to popularize and defend together.
    Let our property be safe!


    First of all, I will share with you a few real cases that have been closed by the court, including the loss of credit card and fraudulent use, signature handwriting identification is inconsistent, but the cardholder still has to bear part of the responsibility! As well as the obvious counterfeit card consumption situation of short-term consumption in different places, the cardholder must also bear the responsibility of not protecting the password! So, let's take a look at how to prevent it!

    □If the credit card is stolen and used fraudulently, should the merchant be responsible for the loss, or should the cardholder be responsible for the loss?

    Facts: Mr.
    Kang is the holder of the CITIC Bank credit card.
    2009 Nian 4 Yue 7 days, Kang lost his wallet at the restaurant for dinner, there are ID cards, credit cards involved.
    Since there is no personal photos on a credit card, there is no password, Kang suddenly panicked, immediately call customer service phone bank to handle the stop payment procedure, and 20 Shi 16 called the police points.
    But even so, the thief was the first to get on the ground.
    Credit cards have been the day 19 Shi 59 Fen stolen brush in the days of entertainment plaza PARKnSHOP stores 10538 yuan.
    During the trial, according to the court’s entrustment, the appraisal agency conducted handwriting verification on the stub of the merchant involved in the consumer transaction, namely the purchase order, and found that the signature on the purchase order was not made by Mr.
    Kang himself.

    Dispute: The merchant’s obligation is to check whether the signature on the purchase order is consistent with the signature on the back of the credit card.
    Now that the credit card is lost, it is impossible to confirm that the signature on the back is made by Mr.
    Kang himself, so the "fake signature" on the purchase order may also be on the back of the credit card.
    Unanimous.
    In other words, Mr.
    Kang cannot guarantee that the signature on the back of the card is his own.
    Merchants are not professionals and cannot verify the authenticity of handwriting.

    Referee: For the loss of 10,538 yuan, Mr.
    Kang is responsible for 30% , and ParknShop is responsible for 70% .

    Judge's interpretation: Merchants are obligated to verify the identity of the customer, the content on the card, and whether the signature of the purchase order is consistent with the signature reserved on the back of the card when the customer spends with a credit card.
    In the case of a credit card being stolen, the card cannot be found, and the cardholder cannot provide the signature pattern reserved on the back, the court generally makes judgments based on daily life experience.
    Before the credit card was lost, Mr.
    Kang had used the card many times.
    If the merchant’s reasoning is valid, then Mr.
    Kang will not be able to complete the usual purchases in the past.
    Therefore, if the reserved signature on the back of the credit card is not done by Mr.
    Kang himself, it is tantamount to setting a limit for himself, which does not conform to common sense.
    Therefore, it is presumed that the two are the same, and it is reasonable to compare Mr.
    Kang's own signature with the signature on the transaction order form involved.
    It turned out that ParknShop did not fulfill its obligation of reviewing signatures well and should bear certain responsibilities.
    At the same time, for Mr.
    Kang himself, he did not take good care of his credit card, which led to the theft and fraudulent use.
    There was also his own fault, so he had to bear a certain proportion of responsibility.

    Core reminder: Pay attention to large orders and separate card storage.
    Merchants should not be sloppy when verifying signatures, especially for large purchases.
    Pay more attention to checking whether the customer's identity information is consistent with the content on the credit card; when the cardholder saves the credit card, it is best to keep the card and the ID card separately.
    Set up multiple guarantees such as consumer passwords.

    □The deposit is missing, and the ATM machine is surprised to find a "stealer".
    Is it deliberate or coincidental?

    Case: 2008 Nian 8 Yue 11 days, Mr.
    Zhang in the bank to apply for a debit card, and memory card into 1 million.
    In the same year 9 Yue 13 Ri 17 Shi 59 Fen 12 seconds to Mr.
    Zhang Jinhai Garden Construction Bank branch ATM machine withdrawals 100 after leaving yuan.
    What he didn't expect was that his bank card account information and password were all copied in just over 30 seconds.
    Later, the public security organs retrieved video data display, the date of the incident 17 Shi 50 Fen 55 or so seconds, two men in Gimhae Garden ATM the unidentified object is installed on the machine, until 17 Shi 56 Fen 40 installation is completed in seconds or so.
    After 3 minutes, Mr.
    Zhang made a withdrawal.
    The next day, Mr.
    Zhang's card was divided into four withdrawals of 9,800 yuan and a handling fee of 16 yuan on the ATM of the Guangzhou branch of Minsheng Bank , and a total loss of 9,816yuan.
    On the 16th of the same month , when the bank called Mr.
    Zhang and said that the transaction in his account was abnormal, the plaintiff discovered that the money from his account had been taken away.
    Mr.
    Zhang then reported the case to the public security organ and negotiated with the bank.

    Dispute: Does the stolen bank card of Mr.
    Zhang belong to a third party forged bank card theft, or does he withdraw it himself? The bank argued that the installation of unknown components does not mean that bank card information and passwords can be successfully stolen.

    Judge: The bank compensated Mr.
    Zhang for 9,816 yuan.

    Judge's interpretation: If it is because the bank card is lost and a third person goes to steal it with a real bank card, then the cardholder may bear part of the responsibility for improper custody; but if it can be proved that the cardholder is operating on the bank's ATM machine, If the relevant information and password are copied by unknown objects and the funds in the card are stolen, then the bank will lose the supervision of its ATM and assume the main responsibility.
    Therefore, the key to the case is whether the card was copied and stolen by others.
    In this case, a complete chain of evidence can be formed between alarm records, transaction flow records, video data and related statements, and the fact that the card was stolen by others can be confirmed.
    As the provider of the ATM machine, the bank has the obligation to guarantee the security of the transaction tool.
    In this case, there was an obvious fault and should bear the liability for compensation.

    Core reminder: Regular inspections are very important, and unidentified objects are carefully identified.
    Banks should conduct regular inspections of transaction sites and tools such as ATM machines, self-service banks and self-service terminals, and set up necessary reminders and warning signs.
    When making transactions, cardholders should pay attention to the card entry port and the password keyboard.
    It is easier to identify unknown objects by careful observation, and they should report to the police in time when they are found.

    □ The card has not been left, but the consumption takes place in a different place.
    Which one is more wronged by the cardholder or the bank?

    Fact: Ms.
    Qiu applied for a credit card from ICBC Wantong Branch in 2006.
    The consumption method was to enter a password and the credit limit was 40,000 yuan.
    2011 Nian 3 Yue 1 Ri 20 Shi 17 points, Ms.
    Qiu credit card spending in the Milky Way a gourmet salon, amounting to 632.
    4 million.
    May the day 21 Shi 28 points, Ms.
    Qiu had received ICBC 95588 reminder text messages to inform the credit card in Macau sum of 84988.
    81 yuan POS machine consumer spending, 7 received another text message minutes after the show in Macau ATM teller machine 3000 Hong Kong dollars.
    After receiving the information, Ms.
    Qiu immediately called the ICBC customer service number, requesting to report the loss and stop payment, and report the case to the public security agency the next day.
    3 Yue 2 , Ms.
    Qiu also fill in the "Query Application" and "non-trading Annotated himself" to the bank.
    Evidence of such payments is not himself operate, Ms.
    Qiu issued her a permit to display the day of the incident 3 Yue 1Ms.
    Riqiu did not enter or leave Hong Kong or Macau.
    After the incident, ICBC also presented to the court the credit card's consumption invoice, receipt and a copy of the credit card and the ID card of the person who swiped the card.
    Evidence shows that a Hong Kong resident Yang Yaobang made purchases in a gold bank, and the copy of the credit card was obviously different from the credit card held by Ms.
    Qiu.

    Dispute: The credit card regulations stipulate that all transactions conducted with a password shall be deemed as my own.
    The bank proposed that the POS machine read the credit card magnetic stripe information and passed the password verification, and the consumption can be regarded as Ms.
    Qiu's.
    Ms.
    Qiu believes that the banking system is flawed.

    Judge: The bank and Ms.
    Qiu will each bear 50 % of the loss .

    Judge's interpretation: To use a credit card for consumption and cash withdrawal, two conditions are indispensable: one is to have a legal and valid credit card; the other is to have a correct and effective password.
    Both are equally important.
    Banks have the obligation to ensure security and carefully review credit cards; cardholders have the obligation to keep passwords carefully.
    Within an hour and a half, the cardholder and the credit card are in Guangzhou, and the consumption takes place in Macau, which is different from normal consumption.
    In the absence of evidence to the contrary, it can be confirmed that the consumption and cash withdrawals in Macau are made with counterfeit cards.
    ICBC, as the card issuing bank, accepted illegally copied bank card transactions and failed to perform its duty of careful review and should be held responsible for the fault.
    On the other hand, the cardholder Ms.
    Qiu, the transaction password is set and kept by the cardholder.
    Unless there is evidence that the password is leaked due to bank reasons, the risk of loss due to the leak of the password should be borne by the cardholder.
    Ms.
    Qiu also has the fault of not keeping the password properly, and she also has to bear certain responsibilities.

    Core reminder: Pay attention to high-risk places, and keep your body stuck is the key.
    The reporter also discovered that Ms.
    Qiu had entered Macau and Hong Kong many times before the card was forged.
    Poor consumption habits are an important reason for bank cards to be copied or passwords leaked .
    For example, consumption in more complicated places such as bars and KTVs , the habit of handing over the card to the waiter to swipe the card, or the habit of not blocking when entering the password at the cashier, etc.
    .
    Cardholders who have set up consumer SMS reminders, once they detect that their bank card has been stolen, they should immediately go to the nearest ATM or merchant to conduct transactions and save the receipt.


    Next, let’s take a look at five common cases that damage the security of bank cards.
    These cases are relatively common recently, but in fact, many of them are scams that can be easily detected.
    As long as we pay attention, we can prevent these risks of property loss.
    Not yet!

    Case 1: Remote credit card swiping, bank card information is copied

    The bank Cumming was in his own hands.
    Why his card was stolen and swiped in other places? Such cases can be seen in many news reports, and Mr.
    Yan, a citizen, has encountered such a strange thing earlier.

    For his bank card and other information, Mr.
    Yan has always kept it very well: bank cards and ID cards are stored separately; bank card information is not stored in the mobile phone; third-party payment software is not easily used, etc.
    However, in this case, his bank card was stolen, and the card address showed that he had never been to another province.

    After thinking back, Mr.
    Yan and the staff of the issuing bank analyzed that the most likely reason was that the bill was paid after eating and the payment was made by remotely swiping the card on the seat.
    During this process, the bank card leaves the range of one's line of sight, causing the information in the card to be copied.

    ●Correct handling method●

    “First of all, when you swipe your card when shopping outside, you must ensure that your bank card is within your line of sight to prevent the bank card information from being copied.
    " The staff of the Xingsha branch of China Construction Bank said that ordinary magnetic stripe cards are easy to copy information.
    At present, most banks have reissued composite cards and used IC chips to record account information, which has a very high safety factor .
    "Citizens with ordinary magnetic stripe cards can go to the bank to exchange for this composite card!"

    Case 2: Mobile phone, bank card and ID card were robbed, and the balance in the bank card was stolen

    Citizen Ms.
    Zhao went home late at night and was robbed of her handbag, which contained her identity card, mobile phone, bank card and other items.
    Thinking that her wallet only had two or three hundred yuan in cash, Ms.
    Zhao didn't care too much, but when she went to reapply for the bank card on the third day, she discovered that the bank card had been stolen and swiped more than 5,000 yuan through a third-party payment platform .

    "Regardless of whether you have opened a third-party payment platform or not, criminals can steal the money in your bank card from the Internet.
    " The staff of the Agricultural Bank of China Changsha County Branch told reporters that if the commonly used mobile phone number is the mobile phone reserved for the bank card The bank card is issued with the ID card that you carry with you, and it is very dangerous to lose the three together.
    "The criminals can register a shopping website account through their mobile phone number and identity verification name, and open the corresponding third-party payment account and balance payment function, thereby stealing the balance in the bank card online.
    "

    ●Correct handling method●

    To prevent this from happening, the staff member stated that it is best to set a mobile phone power-on password, and do not put the mobile phone, ID card and bank card together, and do not even store the ID card number and bank card number in the mobile phone.

    If the mobile phone is stolen or lost, it is best to immediately call the bank and the third-party payment platform to freeze the relevant business, and then find the mobile phone operator to report the lost mobile number and reapply.
    You can also log in to a third-party payment account to close the wireless payment service.
    In addition, if the three are lost together, the loss should also be reported to the public security organs and the bank immediately.

    Case 3: "Special URL" to increase credit limit is actually cheating dynamic password

    8 Yue 25 Ri 9 points Liu received a phone call claiming to be staff Everbright Bank credit card department, Liu said the application can help to enhance the credit limit on the site.

    Subsequently, Ms.
    Liu received an unnumbered text message with the application website attached to it.
    She clicked on the website, followed the prompts to enter her mobile phone number, and received a text message with 6 digits written on it , which was the dynamic password of the Everbright Bank credit card.

    The man called Ms.
    Liu again and wanted to remove the dynamic password in the short message, saying that the bank could review it.

    In the morning 10 Dian 26 Fen , Sharon called to check Everbright Bank, Everbright Bank found their credit card online is consumed 1 million.

    ●Correct handling method●

    1.
    Credit card holders should always take care to protect personal information from leaking.

    2.
    Remember the customer service phone number of the bank applying for the card.
    If you unfortunately encounter a stolen credit card, you should immediately apply for freezing of credit card and payment collection services by phone.
    At the same time, immediately report the case to the local public security agency.

    3 , credit card signature consumption, in order to prevent credit card theft brush, it is best to design a special credit card in the back, not easy to counterfeit signatures.

    4.
    Choose more services that are beneficial to safe card use.
    In order to prevent credit card risks, some domestic banks will also take many measures.
    For example, every transaction in the credit card will be reflected on the mobile phone designated by the customer within a few seconds, so that the cardholder can know the changes in the credit card account at any time, and the cardholder can also keep abreast of the fraudulent transactions And resolve.

    Case 4: Trojan horse is implanted in the mobile phone to block the card prompt message

    On August 12 , Ms.
    Wang went online at home and found that the more than 20,000 yuan in the card was gone.

    She immediately logged into the online bank to check the transaction details and found that the money in it had been stolen in Beijing, Shenzhen and other places.
    The strange thing is that I used to send SMS reminders to my mobile phone for my bank card consumption or deposit and withdrawal.
    Now the money in the card is swiped, and I haven't received a single consumption message.

    So Ms.
    Wang reported the case to the Wucheng police.
    The police went to the bank to retrieve the customer transaction details and saw that the money in Ms.
    Wang's card was transferred through multiple third-party transaction platforms.
    But in fact, there was no transaction between Ms.
    Wang and the third-party trading platform at all.

    According to the analysis of the police, it is similar to this situation.
    Generally, criminals use computer means to plant Trojan horse viruses on the victim's mobile phone, transfer the money in the victim's bank card to a third-party transaction platform, and block the consumption reminder text messages.
    As a result, the victim's bank card was swiped and the text message could not be received, resulting in the victim's later discovery of the stolen property.

    ●Correct handling method●

    1.
    Download mobile phone software through a safe and reliable application market, and try not to click on unknown software and advertisements.

    2.
    Do not log in to various spam websites without security guarantees.
    Once you find that there is unknown software in your mobile phone, you must delete it as soon as possible.
    If you cannot delete it, you can go to the mobile phone store to flash the machine with ROOT permission.

    3.
    If you are stolen, you should report to the local public security agency immediately.

    Case 5: Shopping orders were frozen bank kamo name drop of nearly 1 Wan

    7 Yue 21 Ri Xiawu 6 points of a bank employee Wu District Ms.
    Lu received a text message indicating what its purchase orders due to system upgrades lead to freeze, to be 2 dozen handle customer service calls within hours of artificial refund.

    Ms.
    Lu did not doubt and dialed the number provided in the text message.
    The person who answered the call claimed to be the customer service staff of the shopping website.
    She verified Ms.
    Lu's ID number, the bank card number used for consumption, and the reserved mobile phone number, and asked Ms.
    Lu to tell her mobile phone verification code.

    After the verification text message was sent, Ms.
    Lu saw that it was a text message deducting money from a shopping website and became suspicious.
    She asked the customer service: "Why do I have to pay for a refund?" The other party said that this is a virtual account with a system upgrade, and then the money will be returned to the customer.
    This sentence dispelled Ms.
    Lu's suspicion, and Ms.
    Lu reported the verification code to the other party without much thought.
    Successively, this step was carried out 4 times.

    6 Dian 30 points, Ms.
    Lu has found his account to pay 9895 yuan, and asked each other: "I just bought a 65 ? Yuan things, why pay so much money 'shirk a variety of other use, and finally hang up the phone, Ms.
    Lu knew that she had been deceived.

    ●Correct handling method●

    1.
    If online shopping buyers encounter similar situations, they should first check whether their purchase orders are normal.
    If you have any questions, then contact the seller to verify the order status through the official contact tool of the shopping website.
    Don't trust the content of the unknown SMS, so as to avoid losses by mistakenly logging on the phishing website.

    2.
    If you are unfortunately deceived, you should immediately report the case to the public security organ, and quickly go to the bank to go through the account freezing procedure accompanied by the police to prevent the suspect from transferring and withdrawing funds.

    3.
    If you can accurately provide the bank card number suspected of fraud, you can call the bank customer service phone of the suspected bank card to check the account opening location of the card, and quickly go to the business outlet to check the flow of funds; if the bank card number cannot be accurately provided, you can go to the bank counter Use your ID and bank card to check the scammer's account number.
    Dial the customer service number of the bank to which the fraudulent account belongs, follow the voice prompts, enter the fraudulent account, and then repeat the wrong password 5 times to freeze the fraudulent account.

    Xiaohui said: During the National Day holiday, the opportunities for traveling and spending abroad have also greatly increased.
    Xiaohui will tell you a few real case stories about the security of bank card swiping, let's take a look and learn the lessons, and use science to popularize and defend together.
    Let our property be safe!


    First of all, I will share with you a few real cases that have been closed by the court, including the loss of credit card and fraudulent use, signature handwriting identification is inconsistent, but the cardholder still has to bear part of the responsibility! As well as the obvious counterfeit card consumption situation of short-term consumption in different places, the cardholder must also bear the responsibility of not protecting the password! So, let's take a look at how to prevent it!

    □If the credit card is stolen and used fraudulently, should the merchant be responsible for the loss, or should the cardholder be responsible for the loss?

    :。200947,,、。,,,,2016。,。195910538。,,,。

    :,,,“”。,。,。

    :10538,30%,70%。

    :,、。,,,。,,,,。,,,。,,。,。,,,,。

    :,。,,,;,,。

    □,ATM“”,?

    :2008811,,1。913175912,ATM100。,30,。,,175055,ATM,175640。3,。,9800,16,9816yuan.
    On the 16th of the same month , when the bank called Mr.
    Zhang and said that the transaction in his account was abnormal, the plaintiff discovered that the money from his account had been taken away.
    Mr.
    Zhang then reported the case to the public security organ and negotiated with the bank.

    Dispute: Does the stolen bank card of Mr.
    Zhang belong to a third party forged bank card theft, or does he withdraw it himself? The bank argued that the installation of unknown components does not mean that bank card information and passwords can be successfully stolen.

    Judge: The bank compensated Mr.
    Zhang for 9,816 yuan.

    Judge's interpretation: If it is because the bank card is lost and a third person goes to steal it with a real bank card, then the cardholder may bear part of the responsibility for improper custody; but if it can be proved that the cardholder is operating on the bank's ATM machine, If the relevant information and password are copied by unknown objects and the funds in the card are stolen, then the bank will lose the supervision of its ATM and assume the main responsibility.
    Therefore, the key to the case is whether the card was copied and stolen by others.
    In this case, a complete chain of evidence can be formed between alarm records, transaction flow records, video data and related statements, and the fact that the card was stolen by others can be confirmed.
    As the provider of the ATM machine, the bank has the obligation to guarantee the security of the transaction tool.
    In this case, there was an obvious fault and should bear the liability for compensation.

    Core reminder: Regular inspections are very important, and unidentified objects are carefully identified.
    Banks should conduct regular inspections of transaction sites and tools such as ATM machines, self-service banks and self-service terminals, and set up necessary reminders and warning signs.
    When making transactions, cardholders should pay attention to the card entry port and the password keyboard.
    It is easier to identify unknown objects by careful observation, and they should report to the police in time when they are found.

    □ The card has not been left, but the consumption takes place in a different place.
    Which one is more wronged by the cardholder or the bank?

    Fact: Ms.
    Qiu applied for a credit card from ICBC Wantong Branch in 2006.
    The consumption method was to enter a password and the credit limit was 40,000 yuan.
    2011 Nian 3 Yue 1 Ri 20 Shi 17 points, Ms.
    Qiu credit card spending in the Milky Way a gourmet salon, amounting to 632.
    4 million.
    May the day 21 Shi 28 points, Ms.
    Qiu had received ICBC 95588 reminder text messages to inform the credit card in Macau sum of 84988.
    81 yuan POS machine consumer spending, 7 received another text message minutes after the show in Macau ATM teller machine 3000 Hong Kong dollars.
    After receiving the information, Ms.
    Qiu immediately called the ICBC customer service number, requesting to report the loss and stop payment, and report the case to the public security agency the next day.
    3 Yue 2 , Ms.
    Qiu also fill in the "Query Application" and "non-trading Annotated himself" to the bank.
    Evidence of such payments is not himself operate, Ms.
    Qiu issued her a permit to display the day of the incident 3 Yue 1Ms.
    Riqiu did not enter or leave Hong Kong or Macau.
    After the incident, ICBC also presented to the court the credit card's consumption invoice, receipt and a copy of the credit card and the ID card of the person who swiped the card.
    Evidence shows that a Hong Kong resident Yang Yaobang made purchases in a gold bank, and the copy of the credit card was obviously different from the credit card held by Ms.
    Qiu.

    Dispute: The credit card regulations stipulate that all transactions conducted with a password shall be deemed as my own.
    The bank proposed that the POS machine read the credit card magnetic stripe information and passed the password verification, and the consumption can be regarded as Ms.
    Qiu's.
    Ms.
    Qiu believes that the banking system is flawed.

    Judge: The bank and Ms.
    Qiu will each bear 50 % of the loss .

    Judge's interpretation: To use a credit card for consumption and cash withdrawal, two conditions are indispensable: one is to have a legal and valid credit card; the other is to have a correct and effective password.
    Both are equally important.
    Banks have the obligation to ensure security and carefully review credit cards; cardholders have the obligation to keep passwords carefully.
    Within an hour and a half, the cardholder and the credit card are in Guangzhou, and the consumption takes place in Macau, which is different from normal consumption.
    In the absence of evidence to the contrary, it can be confirmed that the consumption and cash withdrawals in Macau are made with counterfeit cards.
    ICBC, as the card issuing bank, accepted illegally copied bank card transactions and failed to perform its duty of careful review and should be held responsible for the fault.
    On the other hand, the cardholder Ms.
    Qiu, the transaction password is set and kept by the cardholder.
    Unless there is evidence that the password is leaked due to bank reasons, the risk of loss due to the leak of the password should be borne by the cardholder.
    Ms.
    Qiu also has the fault of not keeping the password properly, and she also has to bear certain responsibilities.

    Core reminder: Pay attention to high-risk places, and keep your body stuck is the key.
    The reporter also discovered that Ms.
    Qiu had entered Macau and Hong Kong many times before the card was forged.
    Poor consumption habits are an important reason for bank cards to be copied or passwords leaked .
    For example, consumption in more complicated places such as bars and KTVs , the habit of handing over the card to the waiter to swipe the card, or the habit of not blocking when entering the password at the cashier, etc.
    .
    Cardholders who have set up consumer SMS reminders, once they detect that their bank card has been stolen, they should immediately go to the nearest ATM or merchant to conduct transactions and save the receipt.


    Next, let’s take a look at five common cases that damage the security of bank cards.
    These cases are relatively common recently, but in fact, many of them are scams that can be easily detected.
    As long as we pay attention, we can prevent these risks of property loss.
    Not yet!

    Case 1: Remote credit card swiping, bank card information is copied

    The bank Cumming was in his own hands.
    Why his card was stolen and swiped in other places? Such cases can be seen in many news reports, and Mr.
    Yan, a citizen, has encountered such a strange thing earlier.

    For his bank card and other information, Mr.
    Yan has always kept it very well: bank cards and ID cards are stored separately; bank card information is not stored in the mobile phone; third-party payment software is not easily used, etc.
    However, in this case, his bank card was stolen, and the card address showed that he had never been to another province.

    After thinking back, Mr.
    Yan and the staff of the issuing bank analyzed that the most likely reason was that the bill was paid after eating and the payment was made by remotely swiping the card on the seat.
    During this process, the bank card leaves the range of one's line of sight, causing the information in the card to be copied.

    ●Correct handling method●

    “First of all, when you swipe your card when shopping outside, you must ensure that your bank card is within your line of sight to prevent the bank card information from being copied.
    " The staff of the Xingsha branch of China Construction Bank said that ordinary magnetic stripe cards are easy to copy information.
    At present, most banks have reissued composite cards and used IC chips to record account information, which has a very high safety factor .
    "Citizens with ordinary magnetic stripe cards can go to the bank to exchange for this composite card!"

    Case 2: Mobile phone, bank card and ID card were robbed, and the balance in the bank card was stolen

    Citizen Ms.
    Zhao went home late at night and was robbed of her handbag, which contained her identity card, mobile phone, bank card and other items.
    Thinking that her wallet only had two or three hundred yuan in cash, Ms.
    Zhao didn't care too much, but when she went to reapply for the bank card on the third day, she discovered that the bank card had been stolen and swiped more than 5,000 yuan through a third-party payment platform .

    "Regardless of whether you have opened a third-party payment platform or not, criminals can steal the money in your bank card from the Internet.
    " The staff of the Agricultural Bank of China Changsha County Branch told reporters that if the commonly used mobile phone number is the mobile phone reserved for the bank card The bank card is issued with the ID card that you carry with you, and it is very dangerous to lose the three together.
    "The criminals can register a shopping website account through their mobile phone number and identity verification name, and open the corresponding third-party payment account and balance payment function, thereby stealing the balance in the bank card online.
    "

    ●Correct handling method●

    To prevent this from happening, the staff member stated that it is best to set a mobile phone power-on password, and do not put the mobile phone, ID card and bank card together, and do not even store the ID card number and bank card number in the mobile phone.

    If the mobile phone is stolen or lost, it is best to immediately call the bank and the third-party payment platform to freeze the relevant business, and then find the mobile phone operator to report the lost mobile number and reapply.
    You can also log in to a third-party payment account to close the wireless payment service.
    In addition, if the three are lost together, the loss should also be reported to the public security organs and the bank immediately.

    Case 3: "Special URL" to increase credit limit is actually cheating dynamic password

    8 Yue 25 Ri 9 points Liu received a phone call claiming to be staff Everbright Bank credit card department, Liu said the application can help to enhance the credit limit on the site.

    Subsequently, Ms.
    Liu received an unnumbered text message with the application website attached to it.
    She clicked on the website, followed the prompts to enter her mobile phone number, and received a text message with 6 digits written on it , which was the dynamic password of the Everbright Bank credit card.

    The man called Ms.
    Liu again and wanted to remove the dynamic password in the short message, saying that the bank could review it.

    In the morning 10 Dian 26 Fen , Sharon called to check Everbright Bank, Everbright Bank found their credit card online is consumed 1 million.

    ●Correct handling method●

    1.
    Credit card holders should always take care to protect personal information from leaking.

    2.
    Remember the customer service phone number of the bank applying for the card.
    If you unfortunately encounter a stolen credit card, you should immediately apply for freezing of credit card and payment collection services by phone.
    At the same time, immediately report the case to the local public security agency.

    3 , credit card signature consumption, in order to prevent credit card theft brush, it is best to design a special credit card in the back, not easy to counterfeit signatures.

    4.
    Choose more services that are beneficial to safe card use.
    In order to prevent credit card risks, some domestic banks will also take many measures.
    For example, every transaction in the credit card will be reflected on the mobile phone designated by the customer within a few seconds, so that the cardholder can know the changes in the credit card account at any time, and the cardholder can also keep abreast of the fraudulent transactions And resolve.

    Case 4: Trojan horse is implanted in the mobile phone to block the card prompt message

    On August 12 , Ms.
    Wang went online at home and found that the more than 20,000 yuan in the card was gone.

    She immediately logged into the online bank to check the transaction details and found that the money in it had been stolen in Beijing, Shenzhen and other places.
    The strange thing is that I used to send SMS reminders to my mobile phone for my bank card consumption or deposit and withdrawal.
    Now the money in the card is swiped, and I haven't received a single consumption message.

    So Ms.
    Wang reported the case to the Wucheng police.
    The police went to the bank to retrieve the customer transaction details and saw that the money in Ms.
    Wang's card was transferred through multiple third-party transaction platforms.
    But in fact, there was no transaction between Ms.
    Wang and the third-party trading platform at all.

    ,,,,。,。

    ●●

    1、,、。

    2、。,,,ROOT。

    3、,。

    :1

    7216,,,2。

    ,。,、,。

    ,,。:“?”,,。,。,4。

    6 Dian 30 points, Ms.
    Lu has found his account to pay 9895 yuan, and asked each other: "I just bought a 65 ? Yuan things, why pay so much money 'shirk a variety of other use, and finally hang up the phone, Ms.
    Lu knew that she had been deceived.

    ●Correct handling method●

    1.
    If online shopping buyers encounter similar situations, they should first check whether their purchase orders are normal.
    If you have any questions, then contact the seller to verify the order status through the official contact tool of the shopping website.
    Don't trust the content of the unknown SMS, so as to avoid losses by mistakenly logging on the phishing website.

    2.
    If you are unfortunately deceived, you should immediately report the case to the public security organ, and quickly go to the bank to go through the account freezing procedure accompanied by the police to prevent the suspect from transferring and withdrawing funds.

    3.
    If you can accurately provide the bank card number suspected of fraud, you can call the bank customer service phone of the suspected bank card to check the account opening location of the card, and quickly go to the business outlet to check the flow of funds; if the bank card number cannot be accurately provided, you can go to the bank counter Use your ID and bank card to check the scammer's account number.
    Dial the customer service number of the bank to which the fraudulent account belongs, follow the voice prompts, enter the fraudulent account, and then repeat the wrong password 5 times to freeze the fraudulent account.

    Xiaohui said: During the National Day holiday, the opportunities for traveling and spending abroad have also greatly increased.
    Xiaohui will tell you a few real case stories about the security of bank card swiping, let's take a look and learn the lessons, and use science to popularize and defend together.
    Let our property be safe!

    Xiaohui said: Xiaohui said: During the National Day holiday, the opportunities for traveling and spending abroad have also greatly increased.
    Xiaohui will tell you a few real case stories about the security of bank card swiping, let’s take a look and learn the lessons, and make popular science.
    , Let's defend our property safety together! During the National Day holiday, the opportunities for traveling and spending abroad have also greatly increased.
    Xiaohui will tell you a few real case stories about the security of bank card swiping.
    Let’s take a look and learn the lessons.
    Let’s popularize science and work together to defend our property security.
    Right!


    First of all, I will share with you a few real cases that have been closed by the court, including the loss of credit card and fraudulent use, signature handwriting identification is inconsistent, but the cardholder still has to bear part of the responsibility! As well as the obvious counterfeit card consumption situation of short-term consumption in different places, the cardholder must also bear the responsibility of not protecting the password! So, let's take a look at how to prevent it!

    First of all, I will share with you a few real cases that have been closed by the court, including the loss of credit card and fraudulent use, and the identification of signature handwriting is inconsistent, but the cardholder still has to bear part of the responsibility! As well as the obvious counterfeit card consumption situation of short-term consumption in different places, the cardholder must also bear the responsibility of not protecting the password! So, let's take a look at how to prevent it! First of all, I will share with you a few real cases that have been closed by the court, including the loss of credit card and fraudulent use, signature handwriting identification is inconsistent, but the cardholder still has to bear part of the responsibility! As well as the obvious counterfeit card consumption situation of short-term consumption in different places, the cardholder must also bear the responsibility of not protecting the password! So, let's take a look at how to prevent it!

    □If the credit card is stolen and used fraudulently, should the merchant be responsible for the loss, or should the cardholder be responsible for the loss?

    □If the credit card is stolen and used fraudulently, should the merchant be responsible for the loss, or should the cardholder be responsible for the loss? □If the credit card is stolen and used fraudulently, should the merchant be responsible for the loss, or should the cardholder be responsible for the loss?

    Facts: Mr.
    Kang is the holder of the CITIC Bank credit card.
    2009 Nian 4 Yue 7 days, Kang lost his wallet at the restaurant for dinner, there are ID cards, credit cards involved.
    Since there is no personal photos on a credit card, there is no password, Kang suddenly panicked, immediately call customer service phone bank to handle the stop payment procedure, and 20 Shi 16 called the police points.
    But even so, the thief was the first to get on the ground.
    Credit cards have been the day 19 Shi 59 Fen stolen brush in the days of entertainment plaza PARKnSHOP stores 10538 yuan.
    During the trial, according to the court’s entrustment, the appraisal agency conducted handwriting verification on the stub of the merchant involved in the consumer transaction, namely the purchase order, and found that the signature on the purchase order was not made by Mr.
    Kang himself.

    Facts: Facts: Mr.
    Kang is the holder of the CITIC Bank credit card.
    2009 2009 Nian 4 4 Yue 7 7 days, Kang lost his wallet at dinner in a restaurant, there are ID cards, credit cards involved.
    Since there is no personal photos on a credit card, there is no password, Kang suddenly panicked, immediately call customer service phone bank to handle the stop payment procedure, and 20 20 Shi 16 16 called the police points.
    But even so, the thief was the first to get on the ground.
    Credit cards have been the day 19 19 Shi 59 59 points stolen brush in the days of entertainment PARKnSHOP Square branch 10538 10538 yuan.
    During the trial, according to the court’s entrustment, the appraisal agency conducted handwriting verification on the stub of the merchant involved in the consumer transaction, namely the purchase order, and found that the signature on the purchase order was not made by Mr.
    Kang himself.
    The appraisal agency conducted handwriting verification on the stub of the merchant involved in the consumer transaction, that is, the purchase order, and found that the signature on the purchase order was not made by Mr.
    Kang himself.

    Dispute: The merchant’s obligation is to check whether the signature on the purchase order is consistent with the signature on the back of the credit card.
    Now that the credit card is lost, it is impossible to confirm that the signature on the back is made by Mr.
    Kang himself, so the "fake signature" on the purchase order may also be on the back of the credit card.
    Unanimous.
    In other words, Mr.
    Kang cannot guarantee that the signature on the back of the card is his own.
    Merchants are not professionals and cannot verify the authenticity of handwriting.

    Dispute: Dispute: The merchant’s obligation is to check whether the signature on the purchase order is consistent with the signature on the back of the credit card.
    Now that the credit card is lost, it is impossible to confirm that the signature on the back is made by Mr.
    Kang himself, so the "fake signature" on the purchase order may also be The back of the credit card is the same.
    In other words, Mr.
    Kang cannot guarantee that the signature on the back of the card is his own.
    Merchants are not professionals and cannot verify the authenticity of handwriting.

    Referee: For the loss of 10,538 yuan, Mr.
    Kang is responsible for 30% , and ParknShop is responsible for 70% .

    Judge: Judge: 10538 10538 yuan loss, Mr.
    Kang is responsible for 30% 30% , and ParknShop is responsible for 70% 70% .

    Judge's interpretation: Merchants are obligated to verify the identity of the customer, the content on the card, and whether the signature of the purchase order is consistent with the signature reserved on the back of the card when the customer spends with a credit card.
    In the case of a credit card being stolen, the card cannot be found, and the cardholder cannot provide the signature pattern reserved on the back, the court generally makes judgments based on daily life experience.
    Before the credit card was lost, Mr.
    Kang had used the card many times.
    If the merchant’s reasoning is valid, then Mr.
    Kang will not be able to complete the usual purchases in the past.
    Therefore, if the reserved signature on the back of the credit card is not done by Mr.
    Kang himself, it is tantamount to setting a limit for himself, which does not conform to common sense.
    Therefore, it is presumed that the two are the same, and it is reasonable to compare Mr.
    Kang's own signature with the signature on the transaction order form involved.
    It turned out that ParknShop did not fulfill its obligation of reviewing signatures well and should bear certain responsibilities.
    At the same time, for Mr.
    Kang himself, he did not take good care of his credit card, which led to the theft and fraudulent use.
    There was also his own fault, so he had to bear a certain proportion of responsibility.

    Judge's interpretation: Judge's interpretation: Merchants are obliged to verify the identity of the customer, the content on the card, and whether the signature of the purchase order is consistent with the signature reserved on the back of the card when the customer spends with a credit card.
    In the case of a credit card being stolen, the card cannot be found, and the cardholder cannot provide the signature pattern reserved on the back, the court generally makes judgments based on daily life experience.
    Before the credit card was lost, Mr.
    Kang had used the card many times.
    If the merchant’s reasoning is valid, then Mr.
    Kang will not be able to complete the usual purchases in the past.
    Therefore, if the reserved signature on the back of the credit card is not done by Mr.
    Kang himself, it is tantamount to setting a limit for himself, which does not conform to common sense.
    Therefore, it is presumed that the two are the same, and it is reasonable to compare Mr.
    Kang's own signature with the signature on the transaction order form involved.
    It turned out that ParknShop did not fulfill its obligation of reviewing signatures well and should bear certain responsibilities.
    At the same time, for Mr.
    Kang himself, he did not take good care of his credit card, which led to the theft and fraudulent use.
    There was also his own fault, so he had to bear a certain proportion of responsibility.
    For Mr.
    Kang himself, he did not take good care of his credit card, which led to the theft and fraudulent use.
    He also had his own fault, so he must be held accountable for a certain proportion.

    Core reminder: Pay attention to large orders and separate card storage.
    Merchants should not be sloppy when verifying signatures, especially for large purchases.
    Pay more attention to checking whether the customer's identity information is consistent with the content on the credit card; when the cardholder saves the credit card, it is best to keep the card and the ID card separately.
    Set up multiple guarantees such as consumer passwords.

    Core reminder: Core reminder: pay attention to large orders and separate card storage.
    Merchants should not be sloppy when verifying signatures, especially for large purchases.
    Pay more attention to checking whether the customer's identity information is consistent with the content on the credit card; when the cardholder saves the credit card, it is best to keep the card and the ID card separately.
    Set up multiple guarantees such as consumer passwords.
    When the cardholder saves the credit card, he should keep the card and the ID card separately, and it is best to set up multiple protections such as consumer passwords.

    □The deposit is missing, and the ATM machine is surprised to find a "stealer".
    Is it deliberate or coincidental?

    □ deposits missing, □ deposits missing, ATM ATM ATM machine and discovered "stealing recorder", intentional or coincidence? The machine was surprised to find the "stealer" again, deliberately or coincidentally?

    Case: 2008 Nian 8 Yue 11 days, Mr.
    Zhang in the bank to apply for a debit card, and memory card into 1 million.
    In the same year 9 Yue 13 Ri 17 Shi 59 Fen 12 seconds to Mr.
    Zhang Jinhai Garden Construction Bank branch ATM machine withdrawals 100 after leaving yuan.
    What he didn't expect was that his bank card account information and password were all copied in just over 30 seconds.
    Later, the public security organs retrieved video data display, the date of the incident 17 Shi 50 Fen 55 or so seconds, two men in Gimhae Garden ATM the unidentified object is installed on the machine, until 17 Shi 56 Fen 40 installation is completed in seconds or so.
    After 3 minutes, Mr.
    Zhang made a withdrawal.
    The next day, Mr.
    Zhang's card was divided into four withdrawals of 9,800 yuan and a handling fee of 16 yuan on the ATM of the Guangzhou branch of Minsheng Bank , and a total loss of 9,816yuan.
    On the 16th of the same month , when the bank called Mr.
    Zhang and said that the transaction in his account was abnormal, the plaintiff discovered that the money from his account had been taken away.
    Mr.
    Zhang then reported the case to the public security organ and negotiated with the bank.

    Case: Case: 2008 2008 Nian 8 8 Yue 11 11 days, Mr.
    Zhang in the bank to apply for a debit card, and memory card into the 1 1 million.
    In the same year 9 9 Yue 13 13 Ri 17 17 Shi 59 59 minutes 12 12 seconds to Mr.
    Zhang Jinhai Garden Construction Bank branch ATM ATM machine withdrawals 100 100 after leaving yuan.
    What he didn't expect was that in just over 30 to 30 seconds, all his bank card account information and passwords were copied.
    Later, the public security organs retrieved video data display, the incident that day 17 17 Shi 50 50 minutes 55 55 or so seconds, two men in Gimhae garden ATM ATMUnidentified object mounted on the machine, until .
    17 .
    17 when 56 is 56 is minutes 40 40 second or so installed.
    33 After 3 minutes, Mr.
    Zhang made a withdrawal.
    The next day, Mr.
    Zhang Minsheng Bank card on the Guangzhou Branch of ATM withdrawals are four times 9800 9800 yuan fee 16 16 yuan, a total loss 9816 9816 yuan.
    On the 16th and 16th of the same month , when the bank called Mr.
    Zhang and said that the transaction in his account was abnormal, the plaintiff discovered that the money from his account had been taken away.
    Mr.
    Zhang then reported the case to the public security organ and negotiated with the bank.

    Dispute: Does the stolen bank card of Mr.
    Zhang belong to a third party forged bank card theft, or does he withdraw it himself? The bank argued that the installation of unknown components does not mean that bank card information and passwords can be successfully stolen.

    Controversy: Controversy: Does the stolen bank card of Mr.
    Zhang belong to a third party forged bank card theft, or did he withdraw it himself? The bank argued that the installation of unknown components does not mean that bank card information and passwords can be successfully stolen.

    Judge: The bank compensated Mr.
    Zhang for 9,816 yuan.

    Judge: Judge: The bank compensates Mr.
    Zhang 9816 9816 yuan.

    Judge's interpretation: If it is because the bank card is lost and a third person goes to steal it with a real bank card, then the cardholder may bear part of the responsibility for improper custody; but if it can be proved that the cardholder is operating on the bank's ATM machine, If the relevant information and password are copied by unknown objects and the funds in the card are stolen, then the bank will lose the supervision of its ATM and assume the main responsibility.
    Therefore, the key to the case is whether the card was copied and stolen by others.
    In this case, a complete chain of evidence can be formed between alarm records, transaction flow records, video data and related statements, and the fact that the card was stolen by others can be confirmed.
    As the provider of the ATM machine, the bank has the obligation to guarantee the security of the transaction tool.
    In this case, there was an obvious fault and should bear the liability for compensation.

    ::,,;,,;ATMATM,,ATMATM。,。,、、,,。ATM,,,。ATMATM,,,。

    :,。ATM、,。,,,。

    ::,。ATMATM、,。,,,。,,,。

    □,,、?

    □,,、?□,,、?

    :2006,,4。2011312017,,632.
    4。2128,95588,84988.
    81POS,7,ATM3000。,,,。32,《》《》。,,31、。,、。,,。

    ::20062006,,44。20112011331120201717,,632.
    4632.
    4。21212828,9558895588,84988.
    8184988.
    81POSPOS,77,ATMATM30003000。,,,。3322,《》《》。,,3311、。,、。,,。

    ::,。,POS,。,。

    :::,。:,。,POSPOS,。,。

    :50%。

    Judge: Judge: The bank and Ms.
    Qiu will each bear 50 50 % of the loss .

    Judge's interpretation: To use a credit card for consumption and cash withdrawal, two conditions are indispensable: one is to have a legal and valid credit card; the other is to have a correct and effective password.
    Both are equally important.
    Banks have the obligation to ensure security and carefully review credit cards; cardholders have the obligation to keep passwords carefully.
    Within an hour and a half, the cardholder and the credit card are in Guangzhou, and the consumption takes place in Macau, which is different from normal consumption.
    In the absence of evidence to the contrary, it can be confirmed that the consumption and cash withdrawals in Macau are made with counterfeit cards.
    ICBC, as the card issuing bank, accepted illegally copied bank card transactions and failed to perform its duty of careful review and should be held responsible for the fault.
    On the other hand, the cardholder Ms.
    Qiu, the transaction password is set and kept by the cardholder.
    Unless there is evidence that the password is leaked due to bank reasons, the risk of loss due to the leak of the password should be borne by the cardholder.
    Ms.
    Qiu also has the fault of not keeping the password properly, and she also has to bear certain responsibilities.

    Judge's interpretation: Judge's interpretation: To use a credit card for consumption and cash withdrawal, two conditions are indispensable: one is to have a legal and valid credit card; the other is to have a correct and effective password.
    Both are equally important.
    Banks have the obligation to ensure security and carefully review credit cards; cardholders have the obligation to keep passwords carefully.
    Within an hour and a half, the cardholder and the credit card are in Guangzhou, and the consumption takes place in Macau, which is different from normal consumption.
    In the absence of evidence to the contrary, it can be confirmed that the consumption and cash withdrawals in Macau are made with counterfeit cards.
    ICBC, as the card issuing bank, accepted illegally copied bank card transactions and failed to perform its duty of careful review and should be held responsible for the fault.
    On the other hand, the cardholder Ms.
    Qiu, the transaction password is set and kept by the cardholder.
    Unless there is evidence that the password is leaked due to bank reasons, the risk of loss due to the leak of the password should be borne by the cardholder.
    Ms.
    Qiu also has the fault of not keeping the password properly, and she also has to bear certain responsibilities.
    Banks have the obligation to ensure security and carefully review credit cards; cardholders have the obligation to keep passwords carefully.
    The transaction password is set and kept by the cardholder.
    Unless there is evidence that the password is leaked due to bank reasons, the risk of loss due to the leak of the password shall be borne by the cardholder.

    Core reminder: Pay attention to high-risk places, and keep your body stuck is the key.
    The reporter also discovered that Ms.
    Qiu had entered Macau and Hong Kong many times before the card was forged.
    Poor consumption habits are an important reason for bank cards to be copied or passwords leaked .
    For example, consumption in more complicated places such as bars and KTVs , the habit of handing over the card to the waiter to swipe the card, or the habit of not blocking when entering the password at the cashier, etc.
    .
    Cardholders who have set up consumer SMS reminders, once they detect that their bank card has been stolen, they should immediately go to the nearest ATM or merchant to conduct transactions and save the receipt.

    Core reminder: Core reminder: Pay attention to high-risk places, and keep your body stuck is the key.
    The reporter also discovered that Ms.
    Qiu had entered Macau and Hong Kong many times before the card was forged.
    Poor consumption habits are an important reason for bank cards to be copied or passwords leaked.
    Attention should be paid to high-risk locations.
    Keeping the card in check is the key.
    The reporter also discovered that Ms.
    Qiu had entered Macau and Hong Kong many times before the card was forged.
    Poor consumption habits are an important reason for the duplication of bank cards or the disclosure of passwords .
    For example, consumption in more complicated places such as bars, KTV, KTV, etc.
    , the habit of handing over the card to the waiter to swipe the card, or the habit of not blocking when entering the password at the cashier, etc.
    Wait.
    Set SMS alerts consumer cardholders, once aware of the bank card stolen brush, should immediately go to the nearest ATM ATM machine or merchant transactions and save the document.


    Next, let’s take a look at five common cases that damage the security of bank cards.
    These cases are relatively common recently, but in fact, many of them are scams that can be easily detected.
    As long as we pay attention, we can prevent these risks of property loss.
    Not yet!

    Next, let’s take a look at five common cases that damage the security of bank cards.
    These cases are relatively common recently, but in fact many of them are scams that can be easily detected.
    As long as we pay attention, we can prevent these risks of property loss Not yet! Next, let’s take a look at five common cases that damage the security of bank cards.
    These cases are relatively common recently, but in fact, many of them are scams that can be easily detected.
    As long as we pay attention, we can prevent these risks of property loss.
    Not yet!

    Case 1: Remote credit card swiping, bank card information is copied

    Case 1: Remote swiping, bank card information is copied Case 1: Remote swiping, bank card information is copied

    The bank Cumming was in his own hands.
    Why his card was stolen and swiped in other places? Such cases can be seen in many news reports, and Mr.
    Yan, a citizen, has encountered such a strange thing earlier.

    The bank Cumming was in his own hands.
    Why his card was stolen and swiped in other places? Such cases can be seen in many news reports, and Mr.
    Yan, a citizen, has encountered such a strange thing earlier.

    For his bank card and other information, Mr.
    Yan has always kept it very well: bank cards and ID cards are stored separately; bank card information is not stored in the mobile phone; third-party payment software is not easily used, etc.
    However, in this case, his bank card was stolen, and the card address showed that he had never been to another province.

    For his bank card and other information, Mr.
    Yan has always kept it very well: bank cards and ID cards are stored separately; bank card information is not stored in the mobile phone; third-party payment software is not easily used, etc.
    However, in this case, his bank card was stolen, and the card address showed that he had never been to another province.

    After thinking back, Mr.
    Yan and the staff of the issuing bank analyzed that the most likely reason was that the bill was paid after eating and the payment was made by remotely swiping the card on the seat.
    During this process, the bank card leaves the range of one's line of sight, causing the information in the card to be copied.

    After thinking back, Mr.
    Yan and the staff of the issuing bank analyzed that the most likely reason was that the bill was paid after eating and the payment was made by remotely swiping the card on the seat.
    During this process, the bank card leaves the range of one's line of sight, causing the information in the card to be copied.
    The most likely reason is that the bill is paid after the meal, and the payment is caused by remote swiping of the card on the seat.
    During this process, the bank card leaves the range of one's line of sight, causing the information in the card to be copied.

    ●Correct handling method●

    ●Correct handling method● ●Correct handling method●

    “First of all, when you swipe your card when shopping outside, you must ensure that your bank card is within your line of sight to prevent the bank card information from being copied.
    " The staff of the Xingsha branch of China Construction Bank said that ordinary magnetic stripe cards are easy to copy information.
    At present, most banks have reissued composite cards and used IC chips to record account information, which has a very high safety factor .
    "Citizens with ordinary magnetic stripe cards can go to the bank to exchange for this composite card!"

    “First of all, when you swipe your card when shopping outside, you must ensure that your bank card is within your line of sight to prevent the bank card information from being copied.
    " The staff of the Xingsha branch of China Construction Bank said that ordinary magnetic stripe cards are easy to copy information.
    At present, most banks have reissued composite cards and use IC IC chips to record account information, which has a very high safety factor .
    "Citizens with ordinary magnetic stripe cards can go to the bank to exchange for this composite card!" .
    "Citizens with ordinary magnetic stripe cards can go to the bank to exchange for this composite card!"

    Case 2: Mobile phone, bank card and ID card were robbed, and the balance in the bank card was stolen

    Case 2: Mobile phone, bank card, and ID card were robbed, and the balance in the bank card was stolen Case 2: Mobile phone, bank card, and ID card were robbed, and the balance in the bank card was stolen

    Citizen Ms.
    Zhao went home late at night and was robbed of her handbag, which contained her identity card, mobile phone, bank card and other items.
    Thinking that her wallet only had two or three hundred yuan in cash, Ms.
    Zhao didn't care too much, but when she went to reapply for the bank card on the third day, she discovered that the bank card had been stolen and swiped more than 5,000 yuan through a third-party payment platform .

    Citizen Ms.
    Zhao went home late at night and was robbed of her handbag, which contained her identity card, mobile phone, bank card and other items.
    Thinking that her wallet only had two or three hundred yuan in cash, Ms.
    Zhao didn't care too much, but when she went to reapply for the bank card on the third day, she discovered that the bank card had been stolen from a third-party payment platform for 5,000 to 5,000 yuan.

    "Regardless of whether you have opened a third-party payment platform or not, criminals can steal the money in your bank card from the Internet.
    " The staff of the Agricultural Bank of China Changsha County Branch told reporters that if the commonly used mobile phone number is the mobile phone reserved for the bank card The bank card is issued with the ID card that you carry with you, and it is very dangerous to lose the three together.
    "The criminals can register a shopping website account through their mobile phone number and identity verification name, and open the corresponding third-party payment account and balance payment function, thereby stealing the balance in the bank card online.
    "

    "Regardless of whether you have opened a third-party payment platform or not, criminals can steal the money in your bank card from the Internet.
    " The staff of the Agricultural Bank of China Changsha County Branch told reporters that if the commonly used mobile phone number is the mobile phone reserved for the bank card The bank card is issued with the ID card that you carry with you, and it is very dangerous to lose the three together.
    "The criminal can register a shopping website account with a mobile phone number and identity verification name, and open the corresponding third-party payment account and balance payment function, so as to steal the balance in the bank card through the Internet.
    " If the commonly used mobile phone number happens to be reserved for the bank card Mobile phone numbers and bank cards are issued with the ID card that you bring with you.
    Losing the three together is very dangerous.

    ●Correct handling method●

    ●Correct handling method● ●Correct handling method●

    To prevent this from happening, the staff member stated that it is best to set a mobile phone power-on password, and do not put the mobile phone, ID card and bank card together, and do not even store the ID card number and bank card number in the mobile phone.

    To prevent this from happening, the staff member stated that it is best to set a mobile phone power-on password, and do not put the mobile phone, ID card and bank card together, and do not even store the ID card number and bank card number in the mobile phone.

    If the mobile phone is stolen or lost, it is best to immediately call the bank and the third-party payment platform to freeze the relevant business, and then find the mobile phone operator to report the lost mobile number and reapply.
    You can also log in to a third-party payment account to close the wireless payment service.
    In addition, if the three are lost together, the loss should also be reported to the public security organs and the bank immediately.

    If the mobile phone is stolen or lost, it is best to immediately call the bank and the third-party payment platform to freeze the relevant business, and then find the mobile phone operator to report the lost mobile number and reapply.
    If the mobile phone is stolen or lost, it is best to immediately call the bank and the third-party payment platform to freeze the relevant business, and then find the mobile phone operator to report the lost mobile number and reapply.
    You can also log in to a third-party payment account to close the wireless payment service.
    In addition, if the three are lost together, the loss should also be reported to the public security organs and the bank immediately.

    Case 3: "Special URL" to increase credit limit is actually cheating dynamic password

    Case 3: "Special URL" to increase credit limit Case 3: "Special URL" to increase credit limit is actually defrauding dynamic passwords

    8 Yue 25 Ri 9 points Liu received a phone call claiming to be staff Everbright Bank credit card department, Liu said the application can help to enhance the credit limit on the site.

    8 8 Yue 25 25 Ri 9 9 points Liu received a phone call claiming to be staff Everbright Bank credit card department, Liu said the application can help to enhance the credit limit on the site.

    ,,。,,,6,。

    ,,。,,,66,。

    ,,。

    ,,。

    1026,,1。

    10102626,,11。

    ●●

    ●●●●

    1、。

    11、。

    2、。,。,。

    22、。,。,。

    3、,,、。

    33、,,、。,,、。

    4、。,。,,,,,。

    44、。,。,,,,,。

    ::

    812,,。

    881212,,。

    ,,、。,,,。

    ,,、。,,,。

    。,。,。

    。,。,。

    ,,,,。,。

    ,,,,。,。,,,。

    ●●

    ●●●●

    1、,、。

    11、,、。

    2、。,,,ROOT。

    22、。,,,ROOTROOT。

    3、,。

    3、,。3

    :1

    ::111

    7216,,,2。

    77212166,,,22。

    ,。,、,。

    ,。,、,。

    ,,。:“?”,,。,。,4。

    ,,。:“?”,,。,。,44。

    630,9895,:“65,?”,,。

    663030,98959895,:“6565,?”,,。

    ●●

    ●●●●

    1、,。,,。

    11、,。,,。

    2、,,,、。

    22、,,,、。

    3、,,;,。,,,5,。

    33、,,;,。,,,5,。,,,55,。

     
    20146,。/、、、、、,,80,。,,,。

     

     
    20146,。/、、、、、,,80,。,,,。

     

     
    20146,。/、、、、、,,80,。,,,。

     

     
    20146,。/、、、、、,,80,。,,,。

     


    20146,。/、、、、、,,80,。,,,。20146,。/、、、、、,,80,。,,,。
    This article is an English version of an article which is originally in the Chinese language on echemi.com and is provided for information purposes only. This website makes no representation or warranty of any kind, either expressed or implied, as to the accuracy, completeness ownership or reliability of the article or any translations thereof. If you have any concerns or complaints relating to the article, please send an email, providing a detailed description of the concern or complaint, to service@echemi.com. A staff member will contact you within 5 working days. Once verified, infringing content will be removed immediately.

    Contact Us

    The source of this page with content of products and services is from Internet, which doesn't represent ECHEMI's opinion. If you have any queries, please write to service@echemi.com. It will be replied within 5 days.

    Moreover, if you find any instances of plagiarism from the page, please send email to service@echemi.com with relevant evidence.