Here is a list of other security protocols that have been built into our system:
• Payment Authorizations. We obtain a signature/authorization on any one-time payment for both credit card and ACH transactions to help reduce fraud and chargeback risk.
• For Your Recurring Payments. We send a copy of the payment schedule along with our Terms and Conditions and obtain a signed authorization from the individual directly on the payment schedule.
• Stay Compliant. We remain in compliance with NACHA regulations, Regulation E, and the Electronic Funds Transfer Act.
• Legally Binding Signature. The service we use to authorize payments has a patent pending technology to create a legally binding “wet” signature. It is the same as pen on paper, but without the need to wait for the authorization to come back in the mail.