Browse Definitions :
Definition

EMV card

An EMV card is a credit or debit card with an embedded microchip and associated technology designed to enable secure payment at compatible point of sale (POS) terminals.

Compatible terminals enable card dipping for chip and PIN or chip and signature authentication. EMV cards can also support contactless payment through near-field communication (NFC) wireless connectivity. When a customer inserts or taps the payment card, the terminal communicates with the card issuer's system for authentication and a single-use transaction code is issued. The customer inputs their PIN or signs to provide two-step verification. PIN entry is considered more secure because it also provides two-factor authentication: something the user has (the card) and something the user knows (the PIN).

EMV stands for Europay, Mastercard and Visa, the three organizations responsible for the standard. In October 2015, the United States joined 80 countries around the world that had already implemented EMV. The October 1st Payment Card Industry (PCI) deadline signaled a liability shift: Prior to that date, the card provider and the merchant split the cost of fraudulent transactions.

After the deadline, if one partner in the transaction is not compliant with the EMV standard, it must bear the loss: If the merchant has an EMV terminal in place but the financial institution has failed to provide the customer with an EMV card, the burden is on the financial institution. However if the customer has been issued an EMV chip card but the merchant has not installed EMV-compliant terminals, the merchant is held solely responsible. If both parties are compliant with the standard, the card issuer is held responsible.

This was last updated in October 2015

Continue Reading About EMV card

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close