Important Security Notes for your card reader

Written by Jens B.

Last published at: October 9th, 2023

This document contains useful guidelines on how to use your terminal in order to protect your terminal and your customers’ card data. Please read the guidelines carefully and handle your terminal accordingly.

Most important principle: Don’t let third parties access / use your terminal and avoid manipulation under any circumstances. If you have any hints that it has been tampered with, manipulated or exchanged, don’t use the terminal and contact us immediately: We will help you!

We won’t take responsibility for any damages if you don’t adhere to the following rules.

When receiving your terminal / Before using your terminal for the first time

  • Only accept the package if it is not damaged and does not show signs of prior opening.
  • After you have opened the box of the terminal, check the terminal’s serial number (S/N), write it down in your records.
  • Retain shipping documents for possible warranty and inspection issues.

Before using the terminal

  • Check if your terminal shows any signs of tampering or manipulation (e.g. loose or missing screws, unusual appearance, cables), if yes, don’t use it and contact us immediately:

When you don’t use the terminal

  • Never leave your terminal unattended. Store it in a secure location (e.g. a locked cabinet) when it is not in use (e.g. outside business hours or during breaks).
  • Always store it out of reach for third parties, and never give it away to unauthorized people.
  • You must not modify this terminal, give it away, or operate it in any other unauthorized manner.

When the terminal has been stolen / lost

  • Contact us immediately: We will disable the terminal, so that it cannot be used by third parties.

Managing your terminals

  • Maintain an inventory list with all your terminals that at least contains the serial number and type of every terminal (you can also add special characteristics like logos, color of the case, etc.).
  • Regularly check all the terminals in your inventory to detect lost or stolen equipment and check them for possible signs of manipulation or tampering. Confirm this in your records.