Skip to main content
All Posts By

Lincoln Jalandoni

IT

Uncovering Payment Fraud: Red Flags and Protective Measures for Merchants

As the prevalence of payment fraud continues to rise, merchants face the imperative to stay vigilant and take proactive measures. Recognizing key red flags and swiftly responding can shield businesses from potential financial losses. This condensed guide offers crucial insights to help merchants navigate the complex landscape of payment fraud.

Payment Fraud Red Flags to Watch For:

  1. Unusual Order Patterns:
    • Detect large quantities of the same item or bulk orders to unconventional addresses.
    • Merchants should pay attention to unusual order patterns, such as large quantities of the same item or bulk orders with delivery to unconventional addresses.
  2. Multiple Card Numbers:
    • Identify customers providing several card numbers for a single purchase, especially with minor variations.
    • Multiple card numbers for a single purchase, especially with minor variations, can be a clear indicator of potential payment fraud.
  3. Expedited Shipping Requests:
    • Be cautious of requests for overnight delivery without cost considerations.
    • Merchants should exercise caution when receiving requests for overnight delivery without proper cost considerations.
  4. Urgent Processing and Tracking:
    • Address customers demanding immediate order processing and requesting tracking information ASAP.
    • When customers demand immediate order processing and request tracking information ASAP, merchants should scrutinize the transaction for potential fraud.
  5. Phone Orders with Immediate Pick-Up:
    • Look out for placing urgent phone orders and arranging immediate in-person pick-ups.
    • Placing urgent phone orders with immediate in-person pick-ups can be a red flag for potential payment fraud, and merchants should investigate such instances carefully.
  6. Alternate Shipping Addresses:
    • Investigate requests for delivery to addresses other than the billing address or to freight forwarders.
    • Merchants should thoroughly investigate requests for delivery to addresses other than the billing address or to freight forwarders to mitigate the risk of payment fraud.
  7. Unusual Product Requests:
    • Flag orders for items not typically sold by the merchant, particularly high-risk items like cell phones or laptops.
    • Merchants should be on high alert for orders of items not typically sold, especially high-risk items like cell phones or laptops.
  8. Free Email Services:
    • Be cautious of communication via free email services (Yahoo, Hotmail, Gmail), indicating potential fraud.
    • Communication via free email services (Yahoo, Hotmail, Gmail) should be approached with caution, as it may indicate potential fraud.
  9. Relay Calls:
    • Exercise caution with orders obtained through relay calls, recommending a Code 10 authorization.
    • Merchants should exercise caution with orders obtained through relay calls and strongly consider implementing a Code 10 authorization in such cases.

Taking Action with Code 10 Authorization:

  • Initiating Code 10:
    • Call the Voice Authorization phone number and choose the prompt for Code 10.
    • Merchants should be familiar with initiating Code 10 by calling the Voice Authorization phone number and choosing the prompt specifically designated for Code 10.
  • Questioning Process:
    • Answer yes/no questions about the transaction.
    • During the questioning process, merchants should be prepared to answer yes/no questions about the transaction to facilitate the Code 10 authorization.
  • Status Update:
    • Merchants receive a status update within 24-72 hours.
    • After initiating Code 10, merchants can expect to receive a status update within 24-72 hours.
  • Authorization Declined:
    • If declined, request an alternative payment method.
    • In case of authorization being declined, merchants should promptly request an alternative payment method from the customer.
  • Preventive Measures:
    • Initiate Code 10 before shipping to avoid processing fees and shipping costs on questionable transactions.
    • To avoid processing fees and shipping costs on questionable transactions, merchants should proactively initiate Code 10 before shipping.
    • Note that initiating Code 10 post-shipping reduces chances of product recovery.
    • It’s crucial to note that while merchants can still request a Code 10 post-shipping, the chances of product recovery may be reduced.

Additional Prevention Tips:

  1. Unusual Purchasing Patterns:
    • Monitor orders deviating from typical buying behavior.
    • Merchants should consistently monitor orders that deviate from typical buying behavior, as these may indicate potential payment fraud.
  2. Geographical Inconsistencies:
    • Be cautious of orders with distant billing and shipping addresses.
    • Exercise caution with orders exhibiting distant billing and shipping addresses, as these may raise suspicions of potential fraud.
  3. IP Address Monitoring:
    • Watch for multiple transactions from the same IP address.
    • Vigilantly watch for multiple transactions originating from the same IP address, as this could be indicative of fraudulent activities.
  4. Data Security Measures:
    • Implement tokenization, encryption, and regular security updates.
    • To enhance data security, merchants should implement robust measures such as tokenization, encryption, and regular updates to security protocols.
  5. Fraud Detection Systems:
    • Invest in real-time fraud detection systems.
    • Investing in real-time fraud detection systems is a proactive approach that can significantly bolster a merchant’s ability to identify and prevent potential fraud.
  6. Customer Authentication:
    • Utilize multi-factor authentication for online transactions.
    • Merchants should prioritize the utilization of multi-factor authentication for online transactions to add an extra layer of security.

Conclusion: Fraud prevention demands an ongoing effort, blending technology, education, and proactive monitoring. Merchants must adapt their strategies to evolving threats, employing a multifaceted approach to secure transactions and safeguard against potential losses. Stay informed, educate your team, and implement robust security measures to fortify your business against payment fraud.

Improve Your Company’s Performance

Ideas To Improve Your Company's Performance

1. Be a leader and a role model

As a business owner or a manager, you must set a standard for a strong work ethic and productivity for your colleagues and employees in the office through your efforts.

Even if you don’t notice it, you are your colleagues’ team leader and role model.

They look up to you, and if you don’t work hard daily and show results for the effort, why should they?

Actionable tips:

  • Always take accountability & responsibility for projects.
  • Display a strong and organized work ethic.
  • Support all of your employees and guide them accordingly.

2. Communicate with your employees

Communicating clearly and effectively with your employees is the most important key to maximizing their overall performance.

In other words, if you feel like an employee is struggling, offer your help, communicate, and ask questions until a solution is found.

The idea is to create a working environment where the employees are not afraid to communicate and ask for your help.

Actionable tips:

  • Update your employees weekly with what is happening in the business, as that will help in tough times of uncertainty.
  • Have coffee breaks or chat meetings with your employees, where you can talk about problems, help them out when needed, or answer any random questions that they may have.
  • Create an environment where your employees feel comfortable asking for your feedback, review, or whatever.
  • Be genuinely interested in them as professionals on a personal level. This will increase the level of loyalty, work performance, and trust.

3. Provide constructive feedback

Providing regular feedback to your employees based on their performance at the workplace is an essential part of your professional and business relationship.

Without it, your employee won’t know what they are good at or what they need to work on to be better at their job.

One of the best opportunities you will have as a manager or a business owner to provide more in-depth constructive feedback is during progress-related meetings. Your employee will not only take it seriously but will also know exactly what direction to take to be better at their job.

Actionable tips:

  • Provide feedback on as many pieces of work as possible, regardless of how large or small a project is.
  • Discuss what could have been done better and if there is a faster and more efficient way to do a task.

4. Organize and optimize tasks

Typically, if you are in the service industry, your employees will work with you for around 8 hours a day, five days a week. Those 40 hours a week might seem like a lot, but they aren’t.

You’d be surprised to know that over 5 hours on average get wasted by employees waiting for meetings or on other employees every single week.

So, optimizing teamwork processes and removing or improving meetings that are a waste of time can lead to more extraordinary overall performance from your employees.

Actionable tips:

  • If meetings are useless or take up too much time, you can optimize them or remove them.
  • Establish meetings and collaborations between the different departments. This way, employees that don’t typically work together can benefit from each other.
  • Only set up sessions or meetings that are necessary and cannot be done through an e-mail or a phone call.

5. Provide good judgment

At times, we all express our biased opinion or judgment on a particular topic, which can often cause conflict.

As a business manager, you should always be right in the middle and provide a good and fair judgment in every situation.

Other employees around you will see that you are reasonable with your judgment which will make them feel confident in their decision to come to you for advice if something is bothering them.

Actionable tips:

  • Always see both sides of every story. This will help you to make a fair judgment in every situation.
  • Listen more and allow yourself some time to think about your final decision.

6. Let employees learn even from mistakes

Whether it is in the workplace or at home, everyone makes mistakes. It is the most standard human trait. What is vital for you to do as a manager or business owner is to help your employees learn from their mistakes.

Your employee in question will not only appreciate your help but will also work extra hard to ensure that the same mistake doesn’t happen again.

Actionable tips:

  • Give your employees proper guidance for their mistakes if you find it necessary. This way, they will learn from them moving forward.
  • Boost their confidence by encouraging them. This will very quickly restore the smile on their face so that they can get on with their work.
  • Judge each mistake individually and always set a line for what is restricted and where they can have their freedom in making mistakes.

7. Ask questions

If you see an employee struggling or not performing to the level they usually do, go over and ask them if you can help.

Make them feel like they are not alone and that they can trust you. We are not robots, and we all have emotions and problems that could affect our work performance.

Showing care and sympathy is the least you can do to brighten someone’s mood and bring them back to their optimal work ethic.

Actionable tips:

  • Always ask questions when one of your employees is struggling or not performing well. Usually, all they need is a quick chat.

8. Compliment your employees

As people, we love being admired and complimented.

It is simply in our nature and is something employees appreciate. It doesn’t take much to tell your employees that they have done a great job after a big project.

As a business owner or a manager, it is your responsibility to keep your workforce happy and satisfied.

Without them, your business will not exist.

Actionable tips:

  • Give credit where deserved. After a long project, going over to your team and individually congratulating them for their hard work is the least you can do. It will have a massive impact on their confidence and performance moving forward.

9. Provide an enjoyable working environment

No one enjoys working in a messy and outdated environment.

It will indirectly affect your employee performance as the only thing they would want at times is just to leave and go home.

So, providing an enjoyable working environment that your employees get excited to go to in the morning will have a significant effect on their mood and, ultimately, their performance at work.

Actionable tips:

  • Purchase a pool or table tennis table for the office where your employees can relax their minds and engage in activities with colleagues during their break.When making such an investment, you should take into consideration where you will place the activity within your office, as you don’t want your employees on a break to be distracting everyone else.
  • Ensure that all working stations are modern and look great. Usually, you can hire a designer to take care of organizing your office space in accordance with the current trends for optimal employee performance.
  • Ensure that there are plenty of plans and enough daylight in the office. It is proven that sunlight and plans can better work performance and sharpen focus.

If you like this check out 11 tips to improve workplace communication Or check the our other blogs below!

MFA (Multi-factor authentication) 2022

MFA

Growth Factors of MFA

The increasing adoption of cloud computing and the growing security breaches are attributed to the growth of the MFA market.

The emergence of cloud computing has necessitated the need for MFA to become even more indisputable. As organizations are transitioning towards cloud computing technology, security has become the main concern. The number of security breaches in recent years has grown exponentially. According to the Identity Theft Resource Centre’s 2021 Data Breach report, the number of data breaches increased by 68% in the said year when compared to the previous year. Banking and financial services, for instance, are more vulnerable to such attacks. According to the statistical inferences of the UK’s HM Revenue and Customs department, the period between August 2020 and July 2021 saw more than 450 financial support scams related to COVID 19. Furthermore, in December 2021, a crypto trading platform, Bitmart, suffered a cyberattack wherein hackers withdrew assets worth a whopping $200 million. In November of the same year, hackers breached a decentralized finance platform, bZx, and reportedly stole an estimated amount of $55 million. Also, at the beginning of the same month, the FBI issued a warning related to increasing scams related to cryptocurrency ATMs and QR codes. Multiple such cyberattacks are prompting organizations and individuals to adopt better and more stringent authentication solutions. Consequently, additional security measures must be implemented to ensure that access is only restricted to the related personnel. Furthermore, MFA further prompts additional authentication factors that are more difficult to imitate or crack using brute force methods.

Growing stringent compliances and multiple organizations’ initiatives to develop and deploy better authentication solutions are adding impetus to the growth of the MFS market.

The growing concerns over cyber security and the enterprise’s initiatives to seek a better security solution to restrict the security breach is one of the main factors attributed to the surge in demand for the Threat Intelligence market. Amidst rising data breaches, the stringent compliances issued by various governments from multiple regions is further propelling the market. Europe’s General Data Protection Regulation, Brazil’s Lei Geral de Proteçao de Dados, the California Consumer Privacy Act, China’s Personal Data Protection Law, India’s Personal Data Protection Bill, and Nigeria’s Data Protection Regulation are a few of the prime examples of this. Non-compliance with these regulations would result in a hefty fines ranging as high as 5% of the global turnover. Thus, in such a scenario, to meet the increasing demand, authentication solution providers are gearing up to produce new offerings and various other strategic deployments to expand brand presence and meet their client’s demands. For instance, in February 2021, Tynec and Averon, an open communication provider and security solution provider, announced a strategic partnership. Together, the duo is aiming to transform the high data breaches scenario with their Direct Autonomous Authentication solution, offering stringent security via a back-end and 2-factor authentication without the need for user actions or SMS. Further, in February 2022, IPification, a Hong Kong-based authentication and fraud prevention solution provider, launched a one-click phone verification service in the UK. Post-launch, the solution was made available to all banks, fintech, app developers, gaming, and various other business. According to the data recorded by the company, among the app businesses adopting IPification’s one-click verification, the user registration drop-out rate decreased by 5-40 percent based on the business applications. At the same time, the increasing technological advancements have also changed the way authentication solutions work. BAXE’s new Facial Authentication is the best example of this. In February 2022, BAXE, an Australia-based Fintech start-up, teamed up with IDEMIA, a French technology solutions provider, and Haventec, a Sydney-based start-up, to launch the first-ever Decentralized Finance ecosystem comprised of facial authentication. This new offering aims to aid BAXE users in authenticating large transactions, unlocking locked accounts via biometrics, and also recovering access for the accounts to forgotten credentials.

The growing trend of digitization has mandated businesses to deploy efficient, secure, and reliable preventive solutions. At the same time, digitization is also transforming authentication solutions like never before. Such changes are expected to propel the MFA market onward during the forecasted period.

Restraints of MFA

Though MFA solutions aid in strengthening the company’s security, they also have a few cons and aren’t without any risks either. Firstly, setting up multi-factor authentication can be taxing, time-consuming, and expensive. As the number of authentication factors increases, the time taken to complete a single action also increases. Furthermore, acts like sim swapping or switching deployed by cybercriminals can provide them with easy access to the user’s physical sim card and access IDs. Such factors are expected to hinder the market growth.

COVID-19 Insights

COVID-19 has a positive impact on the MFA market. The mandated social distancing measures and lockdowns implemented by various governments have led to the closure of several companies. Consequently, many adopted work-from-home models and digitized their operations by integrating cloud-based platforms to provide remote access. Such a scenario caught many companies unprepared and they suffered from cyberattacks. Thus, the growing cyber threats have resulted in increased demand for MFA solutions.

Source: https://www.researchandmarkets.com

Cybersecurity Awareness Month

October is Cybersecurity Awareness Month: Tips for maintaining payment data security

For the past 19 years, the National Cybersecurity Alliance and the U.S. Cybersecurity & Infrastructure Security Agency have recognized October as National Cybersecurity Awareness Month to promote data security best practices. Throughout the month, small business owners and corporate leaders should take time to learn the risks, identify gaps in security practices, and implement new strategies to fend off cyberattacks. Businesses that accept and process large volumes of payments – especially retailers, restaurants, and e-commerce marketplaces – need to be especially vigilant of fraud attempts and cybercrime. According to a recent study from Card Not Present, every dollar of fraud committed in e-commerce transactions represents $3.75 in losses to the merchant – representing a marked increase from 2019.

With that in mind, spend some time ensuring that your organization evolves its data security practices and reduces the risks of payments fraud – this month and throughout the year. Get started:

Stay up to date with emerging payments fraud risks and impacts

Cybersecurity Awareness Month: Business leaders are generally aware of the reputational and operational risks of fraud – but may underestimate the magnitude of these potential losses. The annual IBM Cost of a Data Breach report shows the massive costs organizations incur after cybersecurity incidents. The report estimates that in 2022, companies lose $4.35 million per data breach event and 83% of surveyed companies had experienced more than one data breach event in the past year.

To avoid reputational, operational, and financial losses, keep yourself informed on the most pressing sources of cybersecurity risk:

  • Digital skimming: Fraudsters infect a website with code that “skims” payment card information while it is being entered into a website during payment, while the merchant and cardholder remain unaware.
  • Ransomware: Harmful code infiltrates and disables an organization’s computer system and holds the data hostage to collect a ransom payment from the organization.
  • Card not present fraud: Attackers leverage online, over-the-phone, and mail-in purchases to conduct fraudulent transactions – relying on the fact that the merchant never sees a physical card as part of the verification process of a payment.

There are no easy answers for combating these threats, but constant vigilance can help. This includes regularly scanning and testing eCommerce sites for vulnerabilities or malware and monitoring the eCommerce environment. For a deeper dive into data security treats, Forbes online news magazine featured the top data security threats of 2022.

Audit your current practices and establish regular check-ins for ongoing security.

Original data security precautions can be thwarted by shifts in store setup, device additions, expansion and administration of eCommerce services, new payment access points and changes to operational procedures. Any one of these can leave a business more susceptible to security control failures, malicious attacks, or accidental information leakage. So, begin looking at what’s changed for your business this year that could have inadvertently created a weak point in your data security set up.

  • Physical device security: Mount payment devices on locking stands and place in locations that you and your staff can see and control to minimize risk of tampering or theft. Also, maintain a list of all devices and develop a routine to inspect them for tampering or substitution. When not in use, store mobile payments devices in locked cabinets or tether to the counter securely. Record the identifying attributes of the device – serial number, model type, operating system, etc. – and regularly review who is authorized to use it.
  • Ecommerce website security: Check your shopping cart software, update operating system versions in a timely fashion, remove inactive plugins as soon as possible, and make sure your SSL certificate is current and renewed on time each year. If you use an outside vendor to develop and maintain that site, be sure the coders don’t leave HTML source code wide open for fraudulent authorization testing. It is important to ensure your source code is well hidden.
  • Employee access security: Validate your processes for strong passwords and user authentication, as well as employee access and logins, and consider implementing multi-factor authentication. Train employees to recognize risk, such as Phishing and social engineering, and how follow appropriate security protocols.
  • PCI DSS compliance validation and patches: Review your organization’s adherence with the Payment Card Industry Data Security Standards (PCI DSS) compliance on a quarterly basis. PCI validation only reflects a point in time and must be diligently upheld with consistent frequency to ensure payments data security. If you find gaps in your processes during these reviews, make a plan to address these quickly and effectively to maintain compliance and customer trust. Further, make sure you understand how your vendor or service provider notifies you of new security patches and be sure you receive and read these notices. For eCommerce businesses, ask your eCommerce hosting provider whether they patch your system and how often.

Cybersecurity Awareness Month will go by quickly – be sure to make these best practices part of your organization’s regular processes to ensure data security year-round. Educating your employees, discussing data security with your partners and vendors, and prioritizing fraud-preventing initiatives are vital steps to protect your organization in the evolving digital-first world.

Canyon Creek Services

CCS provides free, confidential and comprehensive services to survivors of domestic violence and sexual assault and also engages in community education and prevention programming to achieve our vision of “Communities Free of Domestic Violence and Sexual Assault”. We serve all survivors of domestic violence and/or sexual assault regardless of gender, age, sexual orientation or any other identity. CCS provides both immediate crisis and long-term, supportive advocacy services.

At CCS, we are striving to become as well known for our prevention services as we are for the services we provide to survivors. We are actively working to address the reasons why domestic and sexual violence are happening in the first place in the communities we serve through implementing evidence-based, primary prevention programming.

Click Here to learn more.

OCMAC

OCMAC —

When I was in second and third grades I had teachers who taught about kids who live in poverty right here where we live. Kids who don’t have proper beds and go to bed hungry. That thought broke my heart. At the age of 8 I hosted my first food drive to help and I haven’t stopped since. One Can Make A Change became my trademark and I want everyone to know they can help make a change in the world too. We became a non-profit in January of 2016.

ARMANI MCFARLAND

Armani loves to spend time with her family and friends and loves shopping. But Armani’s favorite thing to do is help people by volunteering and hosting drives.

Armani started volunteering and collecting food and other much needed items for children in 2012 at the age of 8. It started with a desire to make sure that no child in our community went to bed hungry. After seeing success with her first food drive, she was determined that there was more she could do to help. She started hosting many different drives to help children in poverty. Over the past 8 years, Armani has collected and donated over 8,000 new backpacks and truck loads of school supplies. Armani has hosted over 40 successful drives to help many people in need. She has collected and donated such things as books for low income children, stuffed animals for scared and injured children; jeans, coats, socks, toothpaste and toothbrushes for homeless and others in need.

In January 2016 Armani turned her drives, fundraising and volunteering into One Can Make a Change, a 501(c)(3) non-profit organization.

Armani has traveled to Ghana, Africa with the organization Think Kindness to work at the VIMA orphanage to install showers and play and work with the kids there.

Armani hopes to not only continue her non-profit but would like to help other nonprofits and youth who have the same mission and desire to help others as she does.

Armani is very excited to keep help as many people as she can and is excited that One Can Make A Change is impacting so many people.

Click Here to learn more.

Youth Futures

Youth futures

Youth Futures —

Youth Futures opened Utah’s first homeless Residential Support Temporary Youth Shelter on February 20, 2015, with 14 temporary overnight shelter beds located in the heart of downtown Ogden.

Our shelter and drop-in services are available to all youth ages 12-17, and we will not exclude any youth who falls within these age ranges, regardless of circumstance. Intensive case management helps youth reunite with family or become self-sufficient, contributing members of our community.

Weekly outreach efforts assist in building rapport with street youth, ensuring they receive food and other basic necessities and educating them about options to living in unsafe conditions. Youth are guided in a loving, supportive and productive way, encouraging their own personal path for a healthy future.

Click Here to learn more.

Happy Factory

Happy Factory —

Miracles happen when people willingly serve others. When Charles and Donna Cooley became aware that many children have never had a toy, they formulated their motto, “We may not be able to make a toy for every child in the world that needs one–but we’re going to try!”

The seeds of their service were planted in a small workshop at their home near Cedar City, Utah in 1995. They made a couple hundred toys that were humbly offered to Primary Children’s Medical Center. The toys were received with such enthusiasm and gratitude that the Cooleys made more and donated them locally to the Canyon Creek Women’s Crisis Center, Cedar City Care and Share, the Presbyterian Church, and within the state of Utah to Shriner’s Hospital, Ronald McDonald House and worldwide.

They named their workshop “The Happy Factory” because of the happiness it brings to them and to the children who receive the wooden toys. In the process, they have learned that toys are not simply playthings, but tools that help unlock a child’s ability to think and to cope with the world around them. What started as a hobby has turned into a full time labor of love.

Since their humble beginnings, The Happy Factory has welcomed volunteers of every age–including juvenile offenders in three state correctional facilities. There are no paid salaries. The Happy Factory is a 501(c)3 non-profit organization. All the materials they use are donated and all of the toys are made by volunteers. Every toy is donated to a child in need. The toys are made of scraps of hardwood donated by a local cabinet maker. Unfortunately, there are a few expenses for wheels and axles, saw blades, building maintenance costs and other miscellaneous items. The Happy Factory workers are toy makers, not fundraisers. It costs approximately fifty cents per toy for wheels and axles. They gratefully accept donations of materials, time, and money.

Click Here to learn more.

DeEye App

deeye

For years children and adults have been going missing with very few found.

Friends and families are left in heartbreak looking for answers to their questions and yearning for closure. 

 

DeEye App will help facilitate the search of missing people not only in the united states but across the globe. We need your help to fight against human trafficking on a global level to locate and bring home those that are still missing. Help us keep an eye out. 

Click Here to learn more.

Data Privacy Policy Agreement.

Applicant Privacy Policy
English


Legal Disclaimer
Effective Date: January 1, 2021
This Applicant Privacy Policy (the “Policy”) describes the practices of Platinum Operating Company, LLC d/b/a Platinum Payments (“Company”) regarding the information that is solely collected through the Platinum Workforce Now portal (“Careers Site”) in connection with your application for a job or internship with us.


1. CATEGORIES OF INFORMATION WE COLLECT THAT YOU PROVIDE
We may collect the following information from you in connection with your application through the Careers Site: Name, e-mail address, mobile number, work authorization status, resume, profile information (e.g. work experience, education, skills, licenses & certifications, and memberships), professional and other work-related licenses, permits and certifications, references, and any other information you elect to provide to us (e.g., employment preferences, willingness to relocate, current salary, desired salary, awards, or professional memberships).
If you do not provide sufficient information, we may be unable to consider your employment application.
However, please avoid submitting the following information that may qualify as sensitive information under applicable law, except where such information is legally required: information on race, religion, ethnicity, nationality or national origin, age, gender identity, sex life or practices or sexual orientation, marital status, medical or health information (including disability status), genetic or biometric information, biometric templates, political or philosophical beliefs, political party or trade union membership, background check information, judicial data such as criminal records or information on other judicial or administrative proceedings, and veteran status.
If the personal information you provide contains details of the information referenced in the preceding paragraph or your job evaluations or educational records, you authorize us to handle such details for the purposes of your job application.
Any information you submit through the Careers Site must be true, complete and not misleading. It is your responsibility to ensure that information you submit does not violate any third party’s rights.
If you provide us with personal information of a reference or any other individual as part of your application, it is your responsibility to obtain consent from that individual prior to providing the information to us.


2. USE OF INFORMATION / LEGAL BASIS
We collect and process information about you for the following reasons:
a) Because you voluntarily provide this information;
b) Because this information is necessary to take steps at your request prior to entering into an employment or internship;
c) Because this information is of particular importance to us and we have a specific legitimate interest under law to process it;
d) To comply with a legal obligation; or
e) Where necessary to protect the vital interests of any person.
The information that you submit on the Careers Site will be used for our personnel recruitment, management, and planning purposes, as permitted by local law, including:
• To process your application;
• To assess your capabilities and qualifications for a job;
• To conduct reference checks;
• To respond to your inquiries and communicate with you about your application, and to send you information regarding the Careers Site and changes to our terms and policies;
• To comply with or monitor compliance with any applicable law or regulation;
• To conduct background checks if we offer you a position; and
• To preserve our other legitimate interests, for example, for our administrative purposes, aggregate management reporting, internal training, and as generally required to conduct our business.
The information about you will be added to our candidate database. If you do not wish us to do this, please contactwendy.clawson@ptpay.us.
If we hire you, personal information we collect in connection with your application may be incorporated into our human resources system and may be used to manage the new-hire process; any such information may become part of your employee file and may be used for other employment-related purposes.
We may also use the information as we believe to be necessary or appropriate: (a) under applicable law, including laws outside your country of residence; (b) to comply with legal process; (c) to respond to requests from public and government authorities including public and government authorities outside your country of residence; (d) to protect our legal rights and operations or the rights, privacy, safety or property, and/or of us, you, or others; and (e) to allow us to pursue available remedies or limit the damages that we may sustain.


3. DISCLOSURE OF PERSONAL INFORMATION
We may share personal information with affiliates and/or partners that are involved in and/or for performing pre-employment, post employment processes in compliance with state and federal law, evaluating candidates for a given position and to track employee and/or contractor performance and progress. We will make the information available to personnel with a business need to know the information, including personnel in the recruiting, human resources, and information technology departments, and in the department responsible for the position for which you are applying and for which you, if hired on an employee or contract basis, hold.
We may share personal information with third-party service providers who provide services such as hosting and operating the Careers Site, recruiting assistance, background check processing, Work Opportunity Tax Credit, eVerify, Equal Employment Opportunity Commission, and any other governmental programs the business elects for voluntary or compliance purposes and similar services.
We also may share personal information as we believe to be necessary or appropriate: (a) under applicable law, including laws outside your country of residence; (b) to comply with legal process; (c) to respond to requests from public and government authorities including public and government authorities outside your country of residence; (d) to protect our legal rights and operations or the rights, privacy, safety or property, and/or of us, you, or others; and (e) to allow us to pursue available remedies or limit the damages that we may sustain.
We may transfer information in the event of any reorganization, merger, sale, joint venture, assignment, transfer or other disposition of all or any portion of our business, assets or stock (including in connection with any bankruptcy or similar proceedings).
Disclosing your personal information may include transferring personal information to other countries (including countries other than where you are based that have a different data protection regime than is found in the country where you are based). If you are located in the European Economic Area (the “EEA”), this may include countries outside of the EEA.


4. DATA RETENTION
We keep your personal information for as long as needed or permitted in light of the purpose(s) for which it was obtained. The criteria used to determine our retention periods include (i) for as long as we have an ongoing relationship with you (such as an application process); as required by a legal obligation to which we are subject; or as advisable in light of our legal position (such as in regard of applicable statutes of limitations, litigation, or regulatory investigations).
We may remove personal information for inactive accounts, subject to any applicable legal or regulatory obligations. Furthermore, we may delete personal information about you (including your CV/résumé) from our database at any time and without providing any reason. Therefore, please retain your own copy of the personal information provided to us.


5. PASSIVE INFORMATION COLLECTION: COOKIES AND TRACKING TECHNOLOGY
When you visit the Careers Site, we collect certain information by automated means. Cookies are small text files that websites send to your computer or other internet-connected device to uniquely identify your browser or to store information or settings in your browser. Cookies allow us to recognize you when you return. They also help us provide a customized experience and enable us to detect certain kinds of fraud. In many cases, you can manage cookie preferences and opt-out of having cookies and other data collection technologies used by adjusting the settings on your browser. All browsers are different, so visit the “help” section of your browser to learn about cookie preferences and other privacy settings that may be available.
We also use Flash Cookies (also known as Local Stored Objects) and similar technologies to personalize and enhance your online experience. The Adobe Flash Player is an application that allows rapid development of dynamic content, such as video clips and animation. We use Flash Cookies for security

purposes and to help remember settings and preferences similar to browser cookies, but these are managed through a different interface than the one provided by your web browser. To manage Flash Cookies, please see Adobe’s website at http://kb2.adobe.com/cps/526/52697ee8.html or visit www.adobe.com. We do not use Flash Cookies or similar technologies for behavioural or interest based advertising purposes.
Pixel tags and web beacons are tiny graphic images placed on website pages or in our emails that allow us to determine whether you have performed a specific action. When you access these pages or open or click an email, the pixel tags and/or web beacons generate a notice of that action. These tools allow us to measure response to our communications and improve our web pages and promotions.
We collect different types of information. For example, we collect information from the device you use to access the Careers Site, your operating system type, browser type, domain, and other system settings, as well as the language your system uses and the country and time zone where your device is located. Our server logs also record the Internet Protocol (“IP”) address assigned to the device you use to connect to the Internet. An IP address is a unique number that devices use to identify and communicate with each other on the internet. We may also collect information about the website you were visiting before you came to us and the website you visit after you leave the Careers Site.
In many cases, the information we collect is only used in a non-identifiable way, without reference to personal information. For example, we use information we collect about website users to optimize the Careers Site and to understand website traffic patterns. In some cases, we associate the information we collect with your personal information. This Policy applies to the information when we associate it with your personal information.

Although the Careers Site currently does not have a mechanism to recognize the various web browser Do Not Track signals, we do offer individuals choices to manage their preferences that are provided in the previous sections above. The Careers Site does not collect personal information about an individual’s online activities over time and across different websites when a consumer uses the Careers Site. To learn more about browser tracking signals and Do Not Track please visit http://www.allaboutdnt.org/. We use Google Analytics as a third-party vendor. For information on how Google Analytics uses data, please visit “How Google uses data when you use our partners sites or apps”, located at http://bit.ly/2jXZ13Y. We also use Pendo as a third-party vendor. For information on how Pendo uses data, please visit https://www.pendo.io/privacypolicy/.

 

6. ACCESS AND CORRECTION
If you register on the Careers Site, you may access, review, and change your personal information stored therein by logging into the Careers Site and updating your account information. However, if you have authenticated your login via a mobile number or email address, such information cannot be updated in the same login session.
We encourage you to promptly update your personal information if it changes or is inaccurate.
Apart from information contained in your profile, where permitted by applicable law, you may request (i) access to personal information we collect, (ii) its modification or suppression, (iii) that we restrict its processing, (iv) that we cease using it (objection right); (v) that we transfer personal information to you or another organization in a structured, commonly used and machine-readable format (right to data portability), and/or (vi) that we not sell any such information. Please email us at wendy.clawson@ptpay.us
or contact us at 1483 Wall Ave, Ogden, UT 84404 with any such requests.
For your protection, we may only implement requests with respect to the information associated with the particular email address that you use to send us your request, and we may need to verify your identity before implementing your request. We will try to comply with your request as soon as reasonably practicable. Please note that certain personal information may be exempt from such access, correction, or suppression rights pursuant to local data protection laws.


7. SECURITY
We use reasonable organizational, technical and administrative measures to protect personal information within our organization. Unfortunately, no data transmission or storage system can be guaranteed to be 100% secure. If you have reason to believe that your interaction with us is no longer secure (for example, if you feel that the security of any account you might have with us has been compromised), please immediately notify us of the problem by contacting us in accordance with the “Contact Us” section below.
We hereby disclaim, as far as permitted by local laws, any liability for us and our affiliates and contractors for any personal information we collect in connection with your application that is lost, misused, illegally accessed, disclosed, altered or destroyed or not timely delivered to our Careers Site.

 

8. LINKS TO THIRD-PARTY WEBSITES
The Careers Site may contain links to other websites. This Policy does not address, and we are not responsible for, the privacy, information or other practices of any third parties, including any third party operating any website or service to which the Careers Site links. The inclusion of a link on the Careers Site does not imply endorsement of the linked site or service by us. We encourage you to read the legal notices posted on those sites, including their privacy policies.


9. LAW APPLICABLE TO JOB APPLICATION
This Careers Site is operated from ADP Workforce Now in Dallas, TX. Accordingly, any personal information you submit to the Careers Site will be collected in ADP Workforce Now in Dallas, TX and will be subject to state of Texas laws.
The Careers Site is not intended for distribution to, or use by, any person or entity in any jurisdiction or country where such distribution or use would be contrary to local law or regulation.


10. ABOUT CHILDREN
The Careers Site is not intended for individuals under the age of 18.


11. CHANGES TO THE POLICY
We reserve the right to amend this Policy at any time in order to address future developments, the Careers Site, or changes in industry or legal trends. We will post the revised Policy on the Careers Site or announce the change on the homepage of the Careers Site.
You can determine when the Policy was revised by referring to the “Last Updated” legend on the top of this Policy.
Any changes will become effective upon the posting of the revised Policy on the Careers Site. By continuing to use the Careers Site following such changes, you will be deemed to have agreed to such changes.
If you do not agree with the terms of this Policy, in whole or part, you can choose to not continue to use the Careers Site.

 

12. CONTACT US
If you have questions or requests, please feel free to contact us at info@ptpay.us or USPS address at 1483 Wall Ave, Ogden, UT 84404.