Table of Content
We all hear banks and credit card issuers constantly reminding us to be careful when using debit cards and credit cards. However, the people who perpetrate such frauds are learning equally fast and they find innovative ways to defraud you. Quite often you realize that the debit for a transaction was not authorized by you at all, nor did you swipe the card. What do you do in such cases?
The moment you find an unauthorized transaction on your card, immediately inform the call center without any delay. When you dial the bank’s call center and register the complaint, you are assigned a complaint file number and confirmation SMS is sent. Keep that for your records as you must mention that file number in all your future correspondence. These call centers operate on a 24X7 basis. A simpler method is to use the card block facility in your mobile app on your smartphone. That becomes effective immediately and you can follow it up with a complaint to the call centre to recover the unauthorized transaction amount.
There are two scenarios here. If the transaction has happened due to the lack of due diligence or fraud by some employee of the bank, your liability is zero. One way to prove such charges is to ensure that all online credit card transactions are only approved based on the OTP received on the mobile. That can be a good way to ward off such frauds.
The other scenario is when the transaction has happened due to your own negligence. You may have not realized about a skimmer in the ATM or you may have responded to phishing mails. In such cases, your liability is zero if you intimate the bank within 3 days of the transaction. This is something you must strictly adhere to.
In case you report the unauthorized transaction between 4-7 days from the actual transaction, your liability will be what the bank decides or the value of the transaction, whichever is lower. Anything above 7 days, the liability is decided by the bank.
Card issuers like HDFC Bank and SBI even call up the customer before authorizing large international transactions on the internet. AMEX gives you a facility wherein you can seek approval for each transaction and nothing else will be permitted. These are additional safety checks you can use.
In the case of credit cards, Visa and MasterCard allow you to cancel the transaction after which it is taken to the disputes tribunal. Such transactions are reversed immediately. But the problem in a debit card is that the transaction is debited to your bank account.
In India debit cards have become popular due to the natural aversion to credit. How do you handle a debit card fraud? Like in the previous case, the first thing to do is to inform the bank. If you have an online app on your smart phone, you can first block the card or change your PIN before complaining to the bank.
RBI has set limits to liability in case of different bank accounts. For example, your maximum liability in a zero-balance basic bank account is Rs5,000. The liability for such fraudulent usage can go as high as Rs10,000 in the cases of other bank accounts. In the case of larger value current accounts, liability can go up to Rs25,000.
When you report a fraudulent transaction to the bank immediately, the burden of proof falls on the bank. The bank is absolved only if it can prove that you were complicit in the fraudulent transaction. In case you find the bank unnecessarily delaying the resolution, you can approach the bank ombudsman. If you are not happy with the ombudsman ruling, you can reach out to the appellate authority within 30 days. Normally, funds will come back to you if it was genuinely outside your control.
Invest wise with Expert advice
IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000
IIFL Capital Services Support WhatsApp Number
+91 9892691696
IIFL Securities Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248
This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.