Browse Definitions :
Definition

EMV card

An EMV card is a credit or debit card with an embedded microchip and associated technology designed to enable secure payment at compatible point of sale (POS) terminals.

Compatible terminals enable card dipping for chip and PIN or chip and signature authentication. EMV cards can also support contactless payment through near-field communication (NFC) wireless connectivity. When a customer inserts or taps the payment card, the terminal communicates with the card issuer's system for authentication and a single-use transaction code is issued. The customer inputs their PIN or signs to provide two-step verification. PIN entry is considered more secure because it also provides two-factor authentication: something the user has (the card) and something the user knows (the PIN).

EMV stands for Europay, Mastercard and Visa, the three organizations responsible for the standard. In October 2015, the United States joined 80 countries around the world that had already implemented EMV. The October 1st Payment Card Industry (PCI) deadline signaled a liability shift: Prior to that date, the card provider and the merchant split the cost of fraudulent transactions.

After the deadline, if one partner in the transaction is not compliant with the EMV standard, it must bear the loss: If the merchant has an EMV terminal in place but the financial institution has failed to provide the customer with an EMV card, the burden is on the financial institution. However if the customer has been issued an EMV chip card but the merchant has not installed EMV-compliant terminals, the merchant is held solely responsible. If both parties are compliant with the standard, the card issuer is held responsible.

This was last updated in October 2015

Continue Reading About EMV card

Networking
  • Telnet

    Telnet is a network protocol used to virtually access a computer and provide a two-way, collaborative and text-based ...

  • big-endian and little-endian

    The term endianness describes the order in which computer memory stores a sequence of bytes.

  • Address Resolution Protocol (ARP)

    Address Resolution Protocol (ARP) is a protocol that maps dynamic IP addresses to permanent physical machine addresses in a local...

Security
  • Mitre ATT&CK framework

    The Mitre ATT&CK (pronounced miter attack) framework is a free, globally accessible knowledge base that describes the latest ...

  • timing attack

    A timing attack is a type of side-channel attack that exploits the amount of time a computer process runs to gain knowledge about...

  • privileged identity management (PIM)

    Privileged identity management (PIM) is the monitoring and protection of superuser accounts that hold expanded access to an ...

CIO
HRSoftware
  • employee resource group (ERG)

    An employee resource group is a workplace club or more formally realized affinity group organized around a shared interest or ...

  • employee training and development

    Employee training and development is a set of activities and programs designed to enhance the knowledge, skills and abilities of ...

  • employee sentiment analysis

    Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee ...

Customer Experience
  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

  • customer insight (consumer insight)

    Customer insight, also known as consumer insight, is the understanding and interpretation of customer data, behaviors and ...

  • buyer persona

    A buyer persona is a composite representation of a specific type of customer in a market segment.

Close