EFTA01377645
EFTA01377646 DataSet-10
EFTA01377647

EFTA01377646.pdf

DataSet-10 1 page 874 words document
P17 V15 P20 V16 P21
Open PDF directly ↗ View extracted text
👁 1 💬 0
📄 Extracted Text (874 words)
S-ILA sellers' businesses. We also obtain sensitive information regarding our sellers' customers. including their contact information, payment card numbers and expiration dates, and purchase histories. We 26 Table of Contents have administrative, technical, and physical security measures in place, and have policies and procedures in place to contractually require third parties to whom we transfer data to implement and maintain appropriate security measures. However, if our security measures or those of the previously mentioned third parties are inadequate or are breached as a result of third-party action, employee error, malfeasance. malware, phishing, hacking attacks, system error, trickery, or otherwise, and, as a result, someone obtains unauthorized access to sensitive information, including personally identifiable information, on our systems or our partners' systems, our reputation and business could be damaged. If the sensitive information is lost or improperly disclosed or threatened to be disclosed, we could incur significant liability and be subject to regulatory scrutiny and penalties, including costs associated with remediating the breach. Under payment card rules and our contracts with our card processors, if there is a breach of payment card information that we store or that is stored by our sellers or other third parties with which we do business, we could be liable to the payment card issuing banks for their cost of issuing new cards and other related expenses. Additionally, if our own confidential business information were improperly disclosed, our business could be materially and adversely affected. A core aspect of our business is the reliability and security of our payments platform. Any perceived or actual breach of security could have a significant impact on our reputation as a trusted brand, cause us to lose existing sellers, prevent us from obtaining new sellers, require us to expend significant funds to remedy problems caused by breaches and to implement measures to prevent further breaches, and expose us to legal risk and potential liability. Any security breach at a company providing services to us, our sellers, or other users of our services could have similar effects. Our risk management efforts may not be effective, which could expose us to losses and liability and otherwise harm our business. We offer payments services and other products and services to a large number of customers, and we are responsible for vetting and monitoring these customers and determining whether the transactions we process for them are legitimate. When our products and services are used to process illegitimate transactions, and we settle those funds to sellers and are unable to recover them, we suffer losses and liability. These types of illegitimate transactions can also expose us to governmental and regulatory sanctions. The highly automated nature of. and liquidity offered by, our payments services make us a target for illegal or improper uses, including fraudulent or illegal sales of goods or services, money laundering, and terrorist financing. Identity thieves and those committing fraud using stolen or fabricated credit card or bank account numbers. or other deceptive or malicious practices, potentially can steal significant amounts of money from businesses like ours. In configuring our payments services, we face an inherent trade-off between security and customer convenience. Our risk management policies, procedures, techniques, and processes may not be sufficient to identify all of the risks to which we are exposed, to enable us to mitigate the risks we have identified, or to identify additional risks to which we may become subject in the future. As a greater number of larger sellers use our services, our exposure to material risk losses from a single seller, or from a small number of sellers, will increase. For example, in the three months ended March 31, 2015, we recorded a loss of approximately 55.7 million related to fraud by a single seller using our payments services. In addition, when we introduce new services, focus on new business types, or begin to operate in markets where we have a limited history of fraud loss, we may be less able to forecast and reserve accurately for those losses. Furthermore, if our risk management policies and processes contain errors or are otherwise ineffective, we may suffer large financial losses, we may be subject to civil and criminal liability, and our business may be materially and adversely affected. We are currently, and will continue to be, exposed to risks associated with chargebacks and refunds in connection with payment card fraud or relating to the goods or services provided by our sellers. In the event that a billing dispute between a cardholder and a seller is not resolved in favor of the seller, including in situations where the seller engaged in 27 Table of Contents fraud, the transaction is typically 'charged back" to the seller and the purchase price is credited or otherwise refunded to the cardholder. If we are unable to collect chargeback or refunds from the seller's account, or if the seller refuses to or is unable to reimburse us for a chargeback or refunds due to closure, bankruptcy, or other reasons, we may bear the loss for the amounts paid to the cardholder. Beginning October 2015, businesses that cannot process EMV chip cards are held financially responsible for http://www.sec.gov/A rehi vestedgaddata/1512673ANS1119312515369092/d937622dsla.html 11/6/2015 7:37:12 AM! CONFIDENTIAL - PURSUANT TO FED. R. GRIM. P. 6(e) DB-SDNY-0074797 CONFIDENTIAL SDNY_GM_00220981 EFTA01377646
ℹ️ Document Details
SHA-256
11d4f515df8e1d7cfafcdfb94beb3e122af8940ed88b06e27adce68e010971bd
Bates Number
EFTA01377646
Dataset
DataSet-10
Document Type
document
Pages
1

Comments 0

Loading comments…
Link copied!