Content Options:

Content Options

View Options:


You are viewing the version of the document as on 2021-01-01.

Article 2 General authentication requirements

  1. (1)

    Payment service providers shall have transaction monitoring mechanisms in place that enable them to detect unauthorised or fraudulent payment transactions for the purpose of the implementation of the security measures referred to in points (a) and (b) of Article 1.

    Those mechanisms shall be based on the analysis of payment transactions taking into account elements which are typical of the payment service user in the circumstances of a normal use of the personalised security credentials.

  2. (2)

    Payment service providers shall ensure that the transaction monitoring mechanisms take into account, at a minimum, each of the following risk-based factors:

    1. (a)

      lists of compromised or stolen authentication elements;

    2. (b)

      the amount of each payment transaction;

    3. (c)

      known fraud scenarios in the provision of payment services;

    4. (d)

      signs of malware infection in any sessions of the authentication procedure;

    5. (e)

      in case the access device or the software is provided by the payment service provider, a log of the use of the access device or the software provided to the payment service user and the abnormal use of the access device or the software.