A&B MONEY PLUS

A&B MONEY PLUS

วันจันทร์, 19 กรกฎาคม 2564 14:30

T&Cs for Corporate & MSBs

 

A&B Money Plus for Corporate Account & MSBs

Terms and Conditions

Valid as of 15-Mar 2022

 

IMPORTANT INFORMATION: These terms and conditions (“Agreement”) govern the use of the Payment Services defined in Clause 1, which are supplied by A&B General (UK) Limited 18 Victoria Parade London SE10 9FR whose details are in Clause 2 (“we”, “us”, “our”) to any person whose application we approve (“Customer”, “you”, “your”). Words that begin with a capital letter have the meaning given either where they first appear in this Agreement.

 

A&B General (UK) Limited is Electronic money institution under FCA licence 716949 for operate e-Wallets in United Kingdom. Registered Office: m228, Trident Business Centre,89 Bickersteth Road, London SW17 9SH. Company Registration number: 6928080 – (On Processing with FCA)

EEA - A&B General (UK) is partner with Modulr FS Europe Limited who is a company registered in Ireland with company number 638002, authorised and regulated by the Central Bank of Ireland as an Electronic Money Institution (Institution Code C191242) for authority in Europe.

You agree that you have read and understood the terms of this Agreement (a copy of which you may download and store at any time).  This Agreement shall commence at that time and continue unless cancelled under Clause 10 or terminated under Clause 12. We reserve the right to change this Agreement by giving 2 months’ notice to you in accordance with Clause 18.  If we do this, you may terminate this Agreement immediately and without charge before the proposed changes take effect, otherwise you shall be deemed to have accepted such changes when the 2 months’ notice expires. However, you agree that changes to the Applicable Exchange Rate may be applied immediately and at the rate quoted via the Payment Service at the time of the relevant Transaction. Please also read the conditions of redemption, including any fees relating to redemption, in Clause 11 before activating your account (E-Wallets).

We will communicate with you in English (the language in which this Agreement was agreed with you on registration for your Account).  Key information relating to your Transactions will be provided to you at the email address you register with us and/or in your Account. You may access, download and print this information at any time by logging in to your Account. In addition, you agree that we may provide notices or other information to you from time to time by posting it in your Account, emailing it to your registered email address, mailing it to your registered physical address, calling you by phone or sending you mobile messages. Notices to you by email or mobile messages shall be deemed given 24 hours after the email is sent, unless the sending party is notified that the email address is invalid. Notices sent by registered mail shall be deemed to have been received three days after the date of mailing. You may contact us as specified in Clause 2.

You may request a copy of any legally required disclosures (including this Agreement) from us via the contact details in Clause 2, and we will provide this to you in a form which enables you to store the information in a way that is accessible for future reference for a period of time adequate for the purposes of the information and which allows the unchanged reproduction of the information stored via, for example, our website, your Account or by email.

 

1.Definitions & Interpretation

In this document, if we use words that start with a capital letter, that means the word has been defined in this ‘Definition & Interpretation’ section.

"Account" or E-Wallet  a data account in our systems where we record your Available Balance, Transaction Data and other information from time to time;
Account Closure” 30 days notice from customers for request account closure. The monthly fee has the meaning given in the attached Fees & Limits Schedule;
Account Information Service” means an online service to provide consolidated information on one or more payment accounts held by the payment service user with another payment service provider or with more than one payment service provider;
“Account Information Service Provideror “AISP” the supplier of an Account Information Service’;
“Additional Accountholder" We do not have account facility with E-Wallets
Authorised Person” means any person to whom you authorise us to access your Account;
"Available Balance” the amount of E-money issued by us to you but not yet spent or redeemed;
Business Day” Monday to Friday, 0900hrs to 1700hrs GMT, excluding bank and public holidays in the UK;      
Customer Due Diligence”   the process we are required to go through to verify the identity of our Customers;
Customer Funds Account”  the segregated current account where we hold relevant funds corresponding to your Available Balance in accordance with the safeguarding provisions of the Electronic Money Regulations 2011;
“Direct Debit” an automated payment method set up between you and us to send payments to organisations in accordance with a direct debit mandate given by you to the organisation which manages the frequency and amount of each payment;
“E-money”       monetary value issued by us to your Account on receipt of funds on your behalf in our Customer Funds Account, equal to the amount of funds received;
“European Economic Area” or “EEA”    The means the European Union (“EU”) member states, as well as Iceland, Liechtenstein and Norway.
“Fees”   the fees payable by you for the Payment Services as specified in the attached Fees & Limits Schedule;
“IBAN”        means an International current Account Number used to identify current accounts for the purposes of international payments;
“Late Redemption Fee”    has the meaning given in the attached Fees & Limits Schedule;
“Merchant"  a retailer who accepts Payment for the sale of goods or services to you.
“Payment”  means a payment for goods via online platform or mobile application.
“Payment Initiation Service”    means an online service to initiate a payment order at the request of the payment service user with respect to a payment account held at another payment service provider;
“Payment Initiation Service Provider” or (“PISP”)               is a payment service provider who supplies a Payment Initiation Service;
“Payment Services” means the services supplied by us to you under this Agreement, including, Accounts and IBANs; and executing Transactions;
“A&B Plus IBAN”   means a virtual IBAN issued by our bank service provider that we allocate to your Account which can be used by you for the purpose of making a SEPA Transfer of funds that will result in a credit of the relevant funds to your Account.
“SEPA Transfer”    A facility available for UK registered Accounts only whereby you instruct us to send Euros to a current account elsewhere in the Single Euro Payments Area (SEPA), quoting the IBAN of the intended recipient of the funds.
“Simplified Due Diligence”   means a lighter form of Customer Due Diligence, resulting in certain lower Account limits
“Transaction” a Direct Debit, Payment, a Transfer or a SEPA Transfer;
“Transfer” a transfer of E-money from one Account to another Account.

 

 2.Contact and Regulatory Information

2.1 Your Account can be managed online at www.abmoneyplus.com or by email to This email address is being protected from spambots. You need JavaScript enabled to view it. or by phone to +44 (0) 203 355 9660. To report your account services please call +44 (0) 203 355 9660 or email This email address is being protected from spambots. You need JavaScript enabled to view it.. At any time during the contractual relationship you shall have the right to receive, on request, these terms and conditions free of charge.

2.2 The issuer for Your A&B Money Plus e-wallets and provider of the Payment Services is A&B Plus. A&B Plus is registered in England and Wales under Company Registration Number is 6928080. Registered Office: M228, Trident Business Centre, 89 Bickersteth Road, London SW17 9SH.

2.3 A&B Plus is authorised and regulated as an e-money issuer by the Financial Conduct Authority registration number 6928080. Details of the A&B Plus authorisation licence by the Financial Conduct Authority is available on the public register at https://register.fca.org.uk/s/firm?id=001b000001HiyR6AAJ.

2.4 A&B General Limited acts as the programme issuer.

2.5 A&B Money Plus is the programme manager and is registered in the UK with registered office located at M228, Trident Business Centre, 89 Bickersteth Road, London SW17 9SH.

 

3.Type of Service, Eligibility and Account Access

3.1 you will have only E-Account where your Available Balance is located.

3.2 Your Payment Services may not be activated unless we have been provided with the required information so that we may identify you and can comply with all applicable Customer Due Diligence requirements. We shall keep records of such information and documents in accordance with all applicable legal and regulatory requirements.

3.3 Reference to a currency (e.g. Euros € or Sterling £) shall mean that amount or the local currency equivalent in which your account is denominated.

3.4 Any Transaction on your account in a currency other than the currency in which your Account is denominated, will require a currency conversion using an Applicable Exchange Rate.

3.5 The Available Balance on your Account and/or Account will not earn any interest.

3.6 The Payment Services are prepaid payment services and not a credit or bank product, you must therefore ensure that you have a sufficient Available Balance from time to time to pay for your Transactions and applicable Fees. If for any reason a Transaction is processed, and the Transaction amount exceeds the Available Balance, you must repay us the amount of such excess immediately and we shall be entitled to stop any existing or subsequent Transactions from proceeding.

3.7 This Agreement does not give you any rights against the Account Schemes, its affiliates or any third party.

3.8 Only persons over 18 years of age are entitled to register for the Payment Services.

3.9 Each time you seek access the Account we will asking for your Access Codes (as defined in Clause 8). As long as the correct Access Codes are entered, we will assume that you are the person giving instructions and making Transactions and you will be liable for them, except to the extent provided for in Clause 8. We can refuse to act on any instruction that we believe: (i) was unclear; (ii) was not given by you; or (iii) might cause us to breach a legal or other duty; or if we believe the Payment Service is being used for an illegal purpose.

3.10 We will do all that we reasonably can to prevent unauthorised access to the Account. As long as you have not breached the other terms contained in this Clause 3 or Clause 8, we will accept liability for any loss or damage to you resulting directly from any unauthorised access to the Account pursuant to Clauses 14 and 15 of this Agreement.

 

4. Service Limits, Direct Debits, Transfers & SEPA Transfer Payment (UK Only)

4.1 Transactions may be restricted by Account or Account type, individual usage patterns and payment risk profiles. Accounts are issued in accordance with regulatory limits and conditions. Limits relating to the use of Accounts can be found in the attached Fees & Limits Schedule and on our website at www.abmoneyplus.com. For anti-money laundering and anti-fraud reasons we reserve our rights to change particular payment restrictions (including from those published or included herein) without notice and to the extent required to meet our regulatory obligations.

4.2 Simplified Due Diligence may be restricted to online platform, along with reduced annual maximum load limits and capped annual withdrawal limits. These limits will be subject to Scheme and regulatory requirements.

4.3 You can make a Transfer to another Account by signing in to your Account and following the relevant instructions.

4.4 When sending funds to your Account with us, we recommend that your or other senders make a Transfer using your A&B Plus current account.

4.5 We cannot be held liable for the payment process or fees associated with bank(s) and or intermediary bank(s) to process payments from you to us. Any fee(s) charged by third parties, not limited to receiving, processing or crediting a payment for you will be deducted by us before crediting the remaining balance to you.

4.6 You are responsible for checking and confirming payment details and fees before making a payment to us or to your Account.

4.7 Where enabled, you may be eligible to instruct other organisations to create regular Direct Debits from your Account. You will be responsible for ensuring that the correct details are provided in order for the Direct Debit to be created for you. You must ensure at all times that you have a sufficient Available Balance to allow for the funds to be debited from your Account. You are responsible for checking the terms and conditions that have been provided to you by the organisation receiving the Direct Debit payments.

4.8 You may incur a charge for unpaid Direct Debits if there are not enough Available Funds to pay an incoming Direct Debit request.

4.9 You accept responsibility for cancelling any Direct Debit on your Account with the originator directly. A&B Plus will be able to do this on your behalf, and cannot accept liability for any losses due to your failure to cancel any Direct Debit.

4.10 A&B Plus will credit payments received to your Account at least once a day and before the end of the Business Day. Amounts received after the cut off period will be processed the next Business Day and you will hold A&B Plus free and clear from any responsibility is this regard.

4.11 You may be asked to provide us with evidence of source of funds in order for us to meet our regulatory requirements, in which case you agree to provide that evidence promptly. You represent and warrant to us that the evidence you provide to us is up to date, complete and accurate.

4.12 Where enabled, you may be eligible to instruct companies to create regular SEPA Transfers from your UK issued and registered Account. You will be responsible for ensuring that the correct details are provided in order for the SEPA Transfer to be created for you. You must ensure at all times that you have a sufficient balance on your Account to allow for the funds to be debited from your Account. You are responsible for checking the terms and conditions that have been provided to you by the SEPA Transfer originator. A&B Plus, reserve(s) the right to decline or terminate any SEPA Transfer instruction(s) that you have requested. 

4.13 You may incur a charge for unpaid SEPA Transfers if there are not enough funds in your Account to pay an incoming SEPA Transfer request.



5.Use of the Payment Services

5.1 You may access your Account information by logging into your Account through our website. From here you will be able to view details on your Transactions, including dates, currencies, charges or exchange rates applied. This information is accessible at any time and can be

5.2 stored and reproduced as necessary.

5.3 You can use the Payment Services up to the amount of the Available Balance for Transactions.

5.4 If the Available Balance is insufficient to pay for a Payment, some Merchants will not permit you to combine use of a Account or Account with other payment methods.

5.5 The value of each Transaction and the amount of any Fees payable by you under this Agreement will be deducted from the Available Balance.

5.6 Once a Transaction is authorised, the relevant payment order may not be withdrawn (or revoked) by you after the time it is received by us, except for Direct Debits, for which you may revoke the payment order up until the end of the Business Day before the day agreed for debiting the funds (see Clause 5.6). A Transaction will be deemed to have been received by us at the time you authorise the Transaction as follows:

  1. for Payments Transactions, at the time we receive the payment order for the Transaction from the merchant acquirer, and
  2. A payment order for a Transfer or SEPA Transfer is provided to and received by us at the time it is issued by you via the Account;
  3. A request for a Direct Debit is deemed to be received on the agreed day (if the agreed day is not a Business Day, the request shall be deemed to have been received on the following Business Day).

5.7 Any Direct Debit will remain in effect until revoked by you at the latest by the end of the Business Day preceding the latest execution date for the relevant Direct Debit. You accept responsibility for cancelling any Direct Debit on your Account with the relevant organisation it was intended to pay. Neither we nor A&B Money Plus will be able to do this on your behalf and cannot accept liability for any losses due to late or non-cancellation of Direct Debits.

5.8 Where a revocation of an authorised payment is agreed between us and you, we may charge a Fee for revocation.

5.9 We will ensure that the amount of a SEPA Transfer is credited to the payment service provider of the payee by end of the Business Day following the time of the receipt of your payment order. If the payment service provider of the Merchant is located outside the EEA, we will effect payment as soon as possible and in any event as required by applicable law.

5.10 In order to protect you and us from fraud, Merchants may seek electronic authorisation before processing any Payment. If a Merchant is unable to get an electronic authorisation, they may not be able to authorise your Payment.

5.11 We may refuse to authorise any use of the Payment Services which could breach these terms and conditions or if we have reasonable grounds for suspecting that you or a third party have committed or are planning to commit fraud or any other illegal or un-permitted use of the Payment Services.

5.12 Your ability to use or access the Payment Services may occasionally be interrupted, for example if we need to carry out maintenance on our Systems. Please contact Customer Services via our website to notify us of any problems you are experiencing using your Account or Account and we will endeavour to resolve any problem.

5.13 Where applicable, you may apply to us for up to 5 Secondary Accounts, for use by Additional Accountholders on your Account. Additional Accountholders, for whom you are legally responsible, must be 13 years of age or older. All other Additional Accountholders must be 18 years of age or older. It is your responsibility to authorise the Transactions incurred by each Additional Accountholder on the relevant Secondary Account and to ensure that the Additional Accountholder keeps to the provision of this Agreement. You are responsible for their use of the Secondary Account and for paying any amounts they add to your Account even if the Additional Accountholder does not keep to the provisions of this Agreement. We accept no responsibility or liability of any kind whatsoever for use of any Secondary Account by any Additional Accountholder for Transactions not authorised by you. If you successfully register and request one, we will send you a Secondary Account in the name of the Additional Accountholder with a copy of this Agreement, for which we will charge you an Additional Account Fee. Upon receipt of the Secondary Account, you may give the Secondary Account to the Additional Accountholder for their use, subject to:

  1. you providing them with the copy of this Agreement (by using the Secondary Account the Additional Accountholder consents to the terms of this Agreement, which will then bind you and the Additional Accountholder in relation to the use of the Secondary Account);
  2. the Secondary Account must only be used by that person;
  3. you continuing to hold the Account and the Account with which the Secondary Account is associated;
  4. you informing the Additional Accountholder that you have retained the Primary Account and that you are still able to use the Account;
  5. us obtaining such further information and documentation in order to enable us to comply with all applicable Customer Due Diligence anti-money laundering requirements in relation to the Additional Accountholder.

5.14 You will remain responsible for the use of the Payment Services, and for any Fees and charges incurred by the Additional Accountholder(s), and you will continue to be regarded as the holder of any funds already or subsequently loaded on the Account. The use of a Account in relation to which an Additional Accountholder has been registered will be regarded as confirmation that you have provided the Additional Accountholder with this Agreement.

5.15 You or any Additional Accountholder may us to remove that Additional Accountholder, and in that case, you must cut the relevant Secondary Account in half.

5.16 You agree that we may give information about your Account to each Additional Accountholders and restrict what Additional Accountholders can do in relation to your Account.

5.17 Except as required by law, we shall not be responsible, and you will be solely responsible, for compiling and retaining your own copy of the data in your Account and your activities in connection with this Agreement. Upon the termination of this Agreement for any reason, we shall have no obligation to store, retain, report, or otherwise provide any copies of, or access to, the Transaction data or any records, documentation or other information in connection with any Transactions or the Account.

5.18 You agree to only use the Payment Services for lawful purposes and to adhere at all times to all laws, rules and regulations applicable to the use of the Payment Services, including the terms of this Agreement. You may not use the Payment Services to receive or transfer any funds on behalf of any other natural person or legal entity.

 

6.Access by Third Party Providers

6.1 You may consent to regulated third party providers (PISPs or AISPs) accessing your Account online to make payments or obtain information about balances or Transactions on your Account.

6.2 The PISPs and/or AISPs must be appropriately registered and authorised in accordance with PSD2. You should check with the regulatory authority of the relevant country before giving consent to the relevant PISP/AISP.

6.3 Any consent you give to a third-party provider is an agreement between you and it, we will have no liability for any loss whatsoever, as a result of any such agreement.

6.4 Before giving consent, you should satisfy yourself as to what degree of access you are consenting to, how it will be used and who it may be passed on to.

6.5 You should make yourself aware of any rights to withdraw the consent of access from the third party provider and what process it has in place to remove access.

6.6 To the extent permitted by law or regulation and subject to any right to refund you may have under this Agreement, between you and us, we are not responsible for any actions that the relevant third party takes in relation to suspending or terminating your use of their service or for any resulting losses. We are also not responsible for, or a party to, any agreement that you enter into with any relevant third party. You should make sure that you read and comply with such agreement or other applicable policies and note that this Agreement will continue to apply between us including to any Payment Services and our Fees as stated continue to apply.

6.7 Where appropriate, we may deny access to your Account, to any third party where we consider such access to be a risk of money laundering or terrorism financing, fraud or other criminal activity. Should we need to take these actions and where possible, we will give reasons for doing so unless restricted by law or for internal security reasons.

 

7. Condition of Use at Certain Merchants

7.1 In some circumstances we or Merchants may require you to have an Available Balance in excess of the Payment amount. For example, at restaurants you may be required to have 15% more on your Account than the value of the bill to allow for any gratuity or service charge added by the restaurant or you.

7.2 In some circumstances Merchants may require verification that your Available Balance will cover the Payment amount and initiate a hold on your Available Balance in that amount, examples include rental cars. In the event a Merchant places a pre-authorisation on your Account, you will not have access to these funds until the Payment is completed or released by the Merchant which may take up to 30 days.

7.3 If you use your Account at an automated fuelling station, subject to Merchant acceptance, your Account may need to be pre-authorised for a pre-determined amount in the relevant currency. If you do not use the whole pre-authorisation or do not have Available Balance to obtain a pre-authorisation, it is possible that the pre-authorised amount will be held for up to 30 days before becoming available to you again.

7.4 Some Merchants may not accept payment using our Payment Services. It is your responsibility to check the policy with each Merchant. We accept no liability if a Merchant refuses to accept payment using our Payment Services.

7.5 In relation to any dispute between the you and a Merchant, provided you are able to satisfy us that you have already made all efforts to resolve the dispute with the relevant Merchant, we will attempt to assist you so far as is reasonably practicable. We may charge you a chargeback processing fee as referenced in the Fees & Limits Schedule provided to you with this document, for any such assistance we may give you with any dispute. If there is an un-resolvable dispute with a Merchant in circumstances where the Account has been used for a Payment, you will be liable for the Payment and will have to resolve this directly with the relevant Merchant.

 

8.Managing & Protecting Your Account

8.1 You are responsible for the safekeeping of your username and password for your Account (“Access Codes”)

8.2 Do not share your username and password with anyone. You must keep your username and password safe, and separate from your Account or any record of your Account number and not disclose it to anyone else. This includes:

  1. memorising your username and password as soon as you receive it, and destroying the post mail or other authorised communication used to transmit it to you;
  2. never writing your username and password on your Account or on anything you usually keep with your Account;
  3. keeping your username and password secret at all times, including by not using your username and password if anyone else is watching;
  4. not disclosing your username and password to any person.

8.3 The user of the Account(s) must sign the signature strip on any Personalised Account immediately when received.

8.4 If you forget your PIN, you can retrieve it using the PIN Reveal option on our website abmoneyplus.com.

8.5 Do not share your Access Codes with anyone except an Authorised Person. If you disclose the Access Codes to any Authorised Person, you are responsible and liable for their access, use or misuse of the Account, their breach of the terms of this Agreement or disclosure of the Access Codes.

8.6 The Payment Services may only be used by you and each Additional Accountholder or Authorised Person.

8.7 You must not give the Account to any other person or allow any other person to use the Payment Services except Authorised Persons or Additional Accountholders. You must keep the Account in a safe place.

8.8 Failure to comply with Clauses 8.2 and/or 8.5 may affect your ability to claim any losses under Clause 14 in the event that we can show that you have intentionally failed to keep the information safe or you have acted fraudulently, intentionally, with undue delay or with gross negligence. In all other circumstances your maximum liability shall be as set out below at Clause 15.

8.9 If you believe that someone else knows your Account or Account security details, you should contact us immediately in accordance with Clause 13.

8.10 Once your Account has expired (see Clause 11), or if it is found after you have reported it as lost or stolen, you must destroy your Account by cutting it in two, through the magnetic strip.

 

9. Identity Verification

9.1 If you enter into Transactions over the internet, some websites require you to enter your name and address. In such cases you should supply the most recent address which has been registered with us by you as the Account address. The Account address is also the address to which we will send any correspondence.

9.2 You must notify us within 7 days of any change in the Account address or your other contact details. You can notify us by contacting Customer Services who may require you to confirm such notification in writing. You will be liable for any loss that directly results from any failure to notify us of such a change as a result of undue delay, your gross negligence or fraud. We will need to verify your new Account address and shall request the relevant proofs from you.

9.3 We reserve the right at any time to satisfy ourselves as to your identity and home address (for example, by requesting relevant original documents) including for the purposes of preventing fraud and/or money laundering. In addition, at the time of your application or at any time in the future, in connection with your Account, you authorise us to perform electronic identity verification checks directly or using relevant third parties.

 

10. Right to Cancel ("Cooling-Off')

You have a right to withdraw from this Agreement under the following conditions:

10.1 where you purchased the Payment Services then you have a “Cooling Off” period of 14 days beginning on the date of the successful registration of your Account, to withdraw from this Agreement and cancel the Payment Services, without any penalty but subject to deduction of any reasonable costs incurred by us in the performance of any part of the provision of services before you cancel. You must contact us within this 14-day period and inform us that you wish to withdraw from this Agreement and you must not use the Payment Services. We will then cancel the Payment Services and reimburse the amount of Available Balance on the Account to you. However, we reserve the right to hold Available Balance for up to 30 business days from receipt of your instructions before returning the balance, to ensure that details of all Transactions have been received.

10.2 After the Cooling Off period you may only terminate the Payment Services as described in Clause 12.

 

11. Expiry & Redemption and Closed Account

11.1 Your funds are available for redemption by contacting us at any time before the end of the 6 years after the date on which this Agreement ends under Clause 12, after which time your Available Balance will no longer be redeemable to you and we are entitled to retain the corresponding funds. Where an Available Balance remains for more than one year after the date on which this Agreement ends under Clause 12, we are not required to safeguard the corresponding funds in our Customer Funds Account, but you can still request redemption for up to 6 years. We may deduct from the proceeds of redemption of any such Available Balance the amount of any Late Redemption Fee.

11.2 Provided that your request for redemption is made less than 12 months following the date on which this Agreement ends under Clause 12, redemption will not incur any Late Redemption Fee. If you make a request for redemption more than 12 months after the date on which this Agreement ends under Clause 12an Account Closure Fee may be charged (where specified).

11.3 We shall have the absolute right to set-off, transfer, or apply sums held in the Account(s) or Accounts in or towards satisfaction of all or any liabilities and Fees owed to us that have not been paid or satisfied when due.

11.4 We shall have the absolute right to close your Account and submit a chargeback claim for the relevant Transactions if your Account is in negative standing for more than 60 days. If our chargeback is successful, funds paid to your Account may only be used to credit your Account or Account, and your Account will remain closed.

11.5 If your Account is inactive (including without limitation no access to the account or payment Transactions) for at least 2 consecutive years and has an Available Balance, we may (but we are not obliged to) notify you by sending an e-mail to your registered e-mail address and give you the option of keeping your Account open and maintaining or redeeming the Available Balance. If you do not respond to our notice within thirty (30) days, we will automatically close your Account and initiate a Transfer of your Available Balance to the last payment account notified by you to us (your Nominated Current Account) or by cheque to your last known address.

 

 12.Termination or Suspension of Your Account and/or Processing of Transactions

12.1 We will terminate this Agreement and your use of the Payment Services with prior notice of at least 1 months. Or we will terminate the agreement at anytime if we found any suspicious activity on your account i.e. money laundering or illegal activities included with our Prohibited Industries/business outside the risk appetite.

12.2 Your use of your Account and any A&B Plus IBAN linked to the Account ends.

12.3 This Agreement and your use of the Payment Services will also end when your ability to initiate all Transactions ceases.

12.4 We may terminate or suspend, for such period as may reasonably be required, your use of the Payment Services in whole or in part at any time or the processing of any Transaction(s) if:

  1. there is any fault or failure in the relevant data processing system(s);
  2. we reasonably believe that you have used or are likely to use the Payment Services, or allow them to be used, in breach of this Agreement or to commit an offence;
  3. any Available Balance may be at risk of fraud or misuse;
  4. we suspect that you have provided false or misleading information;
  5. we are required to do so by law, the police, a court or any relevant governmental or regulatory authority;
  6. required to fulfil our legal obligations in relation to the fight against money laundering and financing of terrorism;
  7. there is suspicion of unauthorised or fraudulent access to or use of your Account or that any of its security features have been compromised, including the unauthorised or fraudulent initiation of a Transaction;
  8. we have reasonable grounds to believe you are carrying out a prohibited or illegal activity;
  9. we are unable to verify your identity or any other information pertaining to you, your Account or a Transaction.

12.5 If any Transactions are found to have been made using your Account or A&B Plus IBAN after expiry or any action has been taken by us under Clause 12.4, you must immediately repay such amounts to us.

12.6 Where it is practicable and lawful for us to do so or would not compromise reasonably justified security reasons, we will notify you via email of the suspension or restriction and the reasons for it before such measures take place or immediately thereafter.

12.7 We will reinstate your Account or execute the relevant Transaction(s) as soon as practicable after the reasons pursuant to Clause 12.4 no longer apply or exist.

12.8 If you wish to terminate the Payment Services at any time, you must request termination and the return of your Available Balance by email to our address in Clause 2 from the email address registered in your Account. Our Customer Services department will then suspend all further use of your Payment Services.

12.9 Once we have received all the necessary information from you (including any Customer Due Diligence) and all Transactions and applicable Fees and charges have been processed, we will refund to the you any Available Balance less any Fees and charges payable to us, provided that:

  1. you have not acted fraudulently or with gross negligence or in such a way as to give rise to reasonable suspicion of fraud or gross negligence; and
  2. we are not required to withhold your Available Balance by law or regulation, or at the request of the police, a court or any regulatory authority.

12.10 Once the Payment Services have been terminated, it will be your responsibility to destroy the Account(s) that were provided to you.

12.11 If, following reimbursement of your Available Balance, any further Transactions are found to have been made or charges or Fees incurred using the Account(s) or we receive a reversal of any prior funding Transaction, we will notify you of the amount and you must immediately repay to us such amount on demand as a debt.

12.12 Unless otherwise terminated in accordance with the provisions of this Agreement, this Agreement will commence on the Commencement Date and continue for the Minimum Term. At the end of the Minimum Term, the Agreement shall automatically renew for successive periods of twelve (12) months (each, a “Renewal Term”), unless terminated by either party giving the other not less than four months’ notice in writing, not to expire earlier than the current Minimum Term or Renewal Term. Partner Platform acknowledges and agrees that clause 12.15. shall apply in the event it exercises its right to terminate before the end of the Minimum Term or Renewal Term.

12.13 Each party may terminate this Agreement immediately by giving written notice to the other party if:

12.13.1 the other party commits a material breach of any of the terms and conditions set out in this Agreement, provided that where such breach is capable of remedy the defaulting party has been advised in writing of the breach and has not rectified it within thirty (30) days of receipt of such notification. A breach shall be considered capable of remedy if time is not of the essence in performance of the obligation and if the defaulting party can comply with the obligation within the thirty (30) day period; or

12.13.2 a decree or order by a court is entered against the other party adjudging that party bankrupt or insolvent or ordering the winding up or liquidation of its affairs; or a petition is filed seeking reorganisation, receivership, administration, arrangement, adjustment, composition or liquidation of or in respect of the other party under any applicable law and is not dismissed within ten (10) days of being filed; or a receiver, administrator, liquidator, assignee, trustee, sequestrator, secured creditor or other similar official is appointed over or in respect of the other party or any substantial part of the property or assets of the other party; or the other party institutes proceedings to be adjudicated bankrupt or insolvent, or consents to the institution of bankruptcy or insolvency proceedings against it, or files a petition or answer or consent seeking reorganisation, administration, relief or liquidation under any applicable law, or consents to the filing of any such petition or to the appointment of a receiver, administrator, liquidator, assignee, trustee, sequestrator, secured creditor or other similar official of the other party or of any substantial part of its property, or makes an assignment for the benefit of creditors, or admits in writing its inability to pay its debts generally as they become due; or any other event occurs which under any applicable law would have an effect analogous to any of the events listed in this clause 12.13.2.

12.14 Without prejudice to clause 12.12., AB Platform may terminate or suspend this Agreement in whole or in part immediately by giving written notice to the Partner Platform if:

12.14.1.the Partner Platform fails to pay the Fees in accordance with the terms set out in the Partner Platform Application Form and remains in default not less than 30 days after being notified to make such payment;

12.14.2.AB Platform is required to do so by AB Platform FS or a Regulator, Card Scheme or the Card Scheme member sponsoring AB Platform FS’ access to the Card Scheme;

12.14.3.AB Platform and/or AB Platform FS deems the Partner Platform’s business and/or activities to be a material risk to AB Platform FS’s authorisation with the Regulator;

12.14.4.in the case of Cards, where AB Platform ceases to provide Cards pursuant to the provisions of Schedule 5;

12.14.5.If AB Platform identifies an impediment capable of altering Partner Platform’s performance of its obligations in relation to providing the AB Platform Products to Introduced Clients, including in relation to the Due Diligence Procedure and the Outsourced Customer Services;

12.14.6.Where Partner Platform makes material changes to its provision of the AB Platform Products to the Introduced Clients, the Outsourced Customer Services and/or the Due Diligence Procedure (including sub-outsourcing or changes to pre-approved sub-contractors) without the prior consent of AB Platform; or

12.14.7.If in AB Platform sole opinion, there are weaknesses regarding the management and security of confidential, personal or otherwise sensitive personal data or information in relation to the provision of the AB Platform Products to Introduced Clients, including in relation to the Due Diligence Procedure and/or Outsourced Customer Services.

12.15 The Partner Platform shall remain liable to pay any minimum or other Fees during the Minimum Term or Renewal Term set out in the Partner Platform Application Form if this Agreement is terminated:

12.15.1 by the Partner Platform under clause 12.12. ;

12.15.2 by AB Platform under clauses 12.13. or 12.14.; or

12.15.3.as a result of the Partner Platform exercising its right to close all of its Accounts in accordance with the terms of the Partner Platform Account Terms and Conditions. In such circumstances, without limitation to any other rights or remedy of AB Platform, such Fees shall be immediately due and must be paid by the Partner Platform within 30 days of the termination date. Immediately upon any of the circumstances set out in clauses 12.15.1. , 12.15.2.  and 12.15.3. , AB Platform shall be entitled to set off and debit the value of any Fees due held in the Partner Platform Account(s).

 

13. Misappropriation of Your Account

13.1 if you think someone is using your Account and/or Access Codes without your permission or if your Account is damaged or malfunctions:

  1. you must contact us as soon as possible and you must provide us with your Account or Account number and either your Username and Password or some other identifying details acceptable to us so that we can be sure we are speaking to you; and
  2. Provided we have obtained your consent to close the Account, we will then provide you with a replacement Account with a corresponding new Account loaded with an amount equivalent to your last Available Balance. 

13.2 Once we have been notified of any loss or theft, we will suspend the Payment Services as soon as we are able, to limit any further losses (see Clause 14). We can only take steps to prevent unauthorised use of the Payment Services if you can provide us with the Account or Account number and Username and Password and if you can produce sufficient details to identify yourself and the relevant Account.

13.3 Replacement Accounts will be posted to the most recent Account address registered by you. Failure to provide the correct address will result in an Account Replacement Fee.

13.4 If you subsequently find or retrieve an Account that you have reported lost or stolen, you must immediately destroy the found Account by cutting it in half through the magnetic stripe and chip.

13.5 You agree to help us, our agents, regulatory authorities and the police if your Account is lost, stolen or if we suspect that the Payment Services are being misused.

 

14.Liability for Unauthorised or Incorrectly Executed Transactions

14.1 Subject to Clauses 14.2, 14.3 and 14.6 we will reimburse you in full for all unauthorised Transactions sent from your Account immediately and in any event no later than the end of the following Business Day after noting or being notified of the Transaction (except where we have reasonable grounds for suspecting fraud), provided that you have informed us of the unauthorised Transaction without undue delay after becoming aware of the Transaction and in any event, no later than 13 months after the Transaction was executed. Where applicable, we shall restore your Account to the state in which it would have been had the unauthorised Transaction not taken place, so that that the credit value date shall be no later than the date the amount had been debited.

14.2 You may be liable for losses relating to any unauthorized Transactions up to a maximum of £35 resulting from the resulting from the use of a lost or stolen Account or the misappropriate of your Account, unless the loss, theft or misappropriation was not detectable to you prior to payment (except where you acted fraudulently) or was caused by acts or lack of action of our employee, agent, branch or service provider.

14.3 You are liable for any losses incurred by an unauthorised Transaction if you have acted fraudulently or failed either intentionally or through gross negligence, to use your Account in accordance with the terms of this Agreement or to keep your Access Codes confidential and secure in accordance with Clause 8.

14.4 You shall not be liable for losses incurred by an unauthorised Transaction which takes place after you have notified us of a compromise of your Access Codes according to Clause 8, unless you have acted fraudulently, or where we have failed to provide you with the means to notify us in the agreed manner without delay on you becoming aware of the loss, theft, misappropriation or unauthorised use of your Account or Account.

14.5 We shall not liable for a refund or losses incurred by an incorrectly or non-executed payment Transaction if the details of the payee’s account provided by you were incorrect or we can prove that the full amount of the Transaction was duly received by the payment service provider of the payee.

14.6 We shall not be liable for any unauthorised or incorrectly executed Transactions in case the Transaction was affected by abnormal and unforeseeable circumstances beyond our reasonable control or where we acted in accordance with a legal obligation.

14.7 Where we are liable for the incorrect execution of a Transfer or SEPA Transfer that you receive under this Agreement, we shall immediately place the amount of the Transaction at your disposal in accordance and credit the corresponding amount to your Account no later than the date on which the amount would have been value dated, had the Transaction been correctly executed.

14.8 Where we are liable for the incorrect execution of a Payment, Transfer or SEPA Transfer by you as payer, we shall, without undue delay, refund to you the amount of the non-executed or defective Transaction, and, where applicable, restore the debited Account to the state in which it would have been had the defective Transaction not taken place.

14.9 In the case of a non-executed or defectively executed Payment, Transfer or SEPA Transfer by you as payer, we shall, regardless of whether we are liable, on request, make immediate efforts to trace the Transaction and notify you of the outcome, free of charge.

14.10 A Payment initiated by or through a payee (e.g. a Merchant) shall be considered to be unauthorised if you have not given your consent for the Payment to be made. If you believe that a Payment has been made without your consent you should contact us in accordance with Clause 2.

14.11 A claim for a refund of an authorised Direct Debit or Payment initiated by or through a payee (e.g. a Merchant) where the authorisation did not specify an exact amount of payment Transaction (and the amount of the Payment exceeded the amount that you reasonably could have expected taking into account your previous spending pattern, this Agreement and the circumstances of the case), must be made within 8 weeks from the date on which the funds were deducted from your Available Balance. Within 10 Business Days of receiving your claim for a refund or within 10 Business Days of receiving further information from you, we will either refund the full amount of the Payment as at the date on which the amount of the Payment was debited or provide you with justification for refusing the refund.

14.12 The right to a refund under this Clause 14 does not apply where you have given consent directly to us for the Payment to be made and, if applicable, information on the Payment was provided or made available to you by us or the payee in an agreed manner for at least four weeks before the due date.

14.13 If you are not satisfied with the justification provided for refusing the refund or with the outcome of your claim for a refund, you may submit a complaint to us or contact the complaints authority as described in Clause 16.

14.14 If at any time we have incorrectly deducted money from your Available Balance, we shall refund the amount to you. If we subsequently establish that the refunded amount had been correctly deducted, we may deduct it from your Available Balance and may charge you a Fee. If you do not have sufficient Available Balance, you must repay us the amount immediately on demand.

14.15 Where any request, Transaction, disputed Transaction, arbitration or reversed Transaction involves third party costs, you remain liable for these and they will be deducted from your Account or otherwise charged to you.

 

 15.General Liability

15.1 Without prejudice to Clause 14 and subject to Clause 15.4;

  1. neither party shall be liable to the other for indirect or consequential loss or damage (including without limitation loss of business, profits or revenues), incurred in connection with this Agreement, whether arising in contract, tort (including negligence), breach of statutory duty or otherwise;
  2. we shall not be liable:
    1. if you are unable to use the Account or Payment Services for any valid reason stated in this Agreement;
    2. for any fault or failure beyond our reasonable control relating to the use of the Payment Services, including but not limited to, a lack of Available Balance or fault in or failure of data processing systems;
    3. for any loss, fault or failure relating to the use of a Third-Party Provider as stated in Clause 6.3, 6.6 and 6.7 of this Agreement,
    4. if a Merchant refuses to accept a Payment or fails to cancel an authorisation or pre-authorisation;
    5. for the goods or services that are purchased with your Account;
    6. for any dispute you might have with a Merchant or other user of the Payment Service where you acted with:

                         15.1.2.6.1 undue delay

                         15.1.2.6.2 fraudulently; or

                         15.1.2.6.13 With gross negligence. (including where losses arise due to your failure to keep us notified of your correct personal details)

15.2 You agree that you will not use the Payment Services in an illegal manner and you agree to indemnify us against any claim or proceeding brought about by such illegal use of the Payment Services by you, your Authorised Person(s) and Additional Accountholder(s).

15.3 You are solely responsible for your interactions with Merchants or other users of the Payment Service. We reserve the right, but have no obligation, to monitor or mediate such disputes. We reserve the right, but have no obligation, to monitor or mediate such disputes.

15.4 To the fullest extent permitted by relevant law, and subject to Clause 14 and Clause 15.5, our total liability under or arising from this Agreement shall be limited as follows:

  1. where your Account is faulty due to our default, our liability shall be limited to replacement of the Account or, at our choice, repayment to you of the Available Balance; and
  2. in all other circumstances of our default, our liability will be limited to repayment of the amount of the Available Balance.

15.5 Nothing in this Agreement shall exclude or limit either Party's liability in respect of death or personal injury arising from that party's negligence or fraudulent misrepresentation.

15.6 No party shall be liable for, or be considered in breach of this Agreement on account of, any delay or failure to perform as required by this Agreement as a result of any causes or conditions which are beyond such Party's reasonable control.

15.7 AB Platform shall not provide the AB Platform Products to the Partner Platform until the following has been completed:-

15.7.1 the Partner Platform passes any relevant KYB and compliance checks that AB Platform deem appropriate (including providing details of the Partner Platform’s own compliance and KYB/KYC procedure and checks on Introduced Clients);

15.7.2 the Partner Platform has ensured that it has completed any technical implementation with AB Platform for the operation of the Account/s or the AB Platform Products;

15.7.3 the Partner Platform passes any IT security test and due-diligence evaluation as deemed appropriate by AB Platform;

15.7.4 AB Platform approves;

                         15.7.4.1 the form of template Introduced Client Contract as referred to at 15.9.; and

                         15.7.4.2 the Partner Platform’s data privacy policy.

 

15.8 The Partner Platform shall provide AB Platform with a copy of its template Introduced Client Contract upon request. Partner Platform shall ensure all Introduced Client Contracts entered into for the purpose of accessing an Account as anticipated by this Agreement are materially the same as the form of the template the Partner Platform is required to provide to AB Platform under this clause 15.9. Partner Platform shall notify AB Platform in the event it deviates from the form of the template provided to AB Platform and shall provide details of such deviations.

 

16. Dispute Resolution

16.1 We are committed to providing an excellent customer experience for all our Customers. If we do not meet your expectations in any way, we want to have the opportunity to put things right.

16.2 In the first instance, your initial communication will be with our Customer Services Team who can be contacted by email to This email address is being protected from spambots. You need JavaScript enabled to view it. or by phone to +44 (0) 203 355 9660. Our Customer Services Team will listen to your needs and will do their best to solve your issue promptly and fairly. We value the opportunity to review the way we do business and help us meet our customers’ expectations.

16.3 If having received a response from our Customer Services Team you are unhappy with the outcome, please contact the Complaints Team of A&B General (UK) Ltd, 18 Victoria Parade London SE10 9FR in writing via email on This email address is being protected from spambots. You need JavaScript enabled to view it..

16.4 Once received, the Complaints Team will conduct an investigation and you will receive a response of its findings within 15 days of receipt of the complaint. In exceptional circumstances where we are unable to reply within the first 15 days, we will reply providing a reason for the delay and deadline for response, not more than 35 days after first receipt of complaint.

16.5 If the Complaints Team is unable to resolve your complaint and you wish to escalate your complaint further, please contact the Financial Ombudsman Service at South Key Plaza, 183 Marsh Wall, London, E14 9SR. Details of the service offered by the Financial Ombudsman Service are available at https://www.financial-ombudsman.org.uk/contact-us/complain-online

16.6 You must provide us with all receipts and information that are relevant to your claim.

 

17. Your Personal Data

17.1 A&B Plus is a registered Data Controller with the Information Commissioners Office in the UK under registration number Z1821175

17.2 In order for us to provide you with the services relating to your Account, we are required to collect and process personal data about you, Additional Accountholders and Authorised Persons, with your consent or on a legal basis to meet our obligations for Anti-Money Laundering legislation or other governmental organisation. Where applicable, if an Account holder is under 16, then parental consent is explicitly required.

17.3 Your consent will be sought for collection of your data and you have the right to agree or decline. Where you decline consent for the collection and processing of your data we reserve our right to discontinue service due to our obligations as a financial services institution.We may disclose or check

17.4 We may disclose or check your personal data with other organisations and obtain further information about you in order to verify your identity and comply with applicable money laundering and governmental regulations. A record of our enquiries will be left on your file.

17.5 We may pass your personal data on to third-party service providers contracted to A&B Plus in the course of dealing with your Account. Any third parties that we may share your data with are obliged to keep your details secure, and to use them only to fulfil the service they provide you on our behalf. Where we transfer the personal data to a third country or international organisation, we ensure this is done securely and that they meet a minimum standard of data protection in their country.

17.6 You have the right to receive information concerning the personal data we hold about you and to rectify such data where it is inaccurate or incomplete. You have the right to object to or withdraw any consent you have given for certain types of processing such as direct marketing.

17.7 Your data will be retained for 6 years after the end of the provision of services to you, where your data will be destroyed in compliance with the requirements of the General Data Protection Regulation.

17.8 In the event that you wish to make a complaint about how your personal data is being processed by us. you have the right to lodge a complaint directly with the supervisory authority and A&B Plus’s Data Protection Officer.

17.9 Our Privacy Policy provides full details on your rights as a data subject and our obligations as a data controller. Please read this document carefully and ensure you understand your rights.

 

18.Changes to the Terms and Conditions

We may update or amend these terms and conditions (including our Fees & Limits Schedule). Notice of any changes will be given on our website, or by e-mail notification, or by SMS at least at anytime. By continuing to use the Payment Services after the expiry of the 2-month notice period you acknowledge that you indicate your acceptance to be bound by the updated or amended terms and conditions. If you do not wish to be bound by them, you should stop using the Payment Services and terminate this Agreement in accordance with Clause 10 before the changes take effect.

 

19.Miscellaneous

19.1 We may assign or transfer our rights, interest or obligations under this Agreement to any third party (including by way of merger, consolidation or the acquisition of all or substantially all of our business and assets relating to the Agreement) upon 2 month’s written notice. This will not adversely affect your rights or obligations under this Agreement.

19.2 Nothing in this Agreement is intended to confer a benefit on any person who is not a party to it, and no such person has any right under the Contracts (Rights of Third Parties) Act 1999 to enforce any terms of this Agreement, but this Clause do not affect a right or remedy of a third party which exists or is available apart from that Act.

19.3 Any waiver or concession we may allow you, will not affect our strict rights and your obligations under this Agreement.

19.4 This Agreement and the documents referred to in it, constitute the entire agreement and understanding of the parties and supersede any previous agreement between the parties relating to the subject matter of this Agreement.

 

20. Funds Protection

All relevant funds corresponding to your Available Balance are segregated from our funds and held in the Customer Funds Account in accordance with the safeguarding requirements of the Electronic Money Regulations 2011 by law. In the event that we became insolvent those funds are protected against claims made by any of our creditors.

 

21.Regulation & Law

21.1 The Payment Services, Account and Account are payment services and not deposit, credit or banking products and are not covered by the Financial Services Compensation Scheme.

21.2 This Agreement shall be governed by and interpreted in accordance with the laws of England & Wales, and any dispute or claim in relation to this Agreement shall be subject to the non-exclusive jurisdiction of the English courts. However, if you reside outside of England and Wales you may bring an action in your country of residence.

_______________________________________________

 

Fee and Limits Schedule

The following Fees apply:

Account Opening

KYB Compliance & Admin proceed for GBP account

£150.00

KYB Compliance & Admin proceed for EUR account

£150.00

KYB Compliance & Admin proceed for USD account

£150.00

Risk Business i.e. Money remittance / Cryptocurrency

From £2000

Monthly Charge

Monthly Service Charge on GBP account

£50.00

Monthly Service Charge on EUR account

€65.00

Monthly Service Charge on USD account

$75.00

Compliance Monthly Charge (Financial& Risk Business)

£500.00

Account Pricing

Outgoing Bank Transfer (UK Local account)

£0.99

Incoming Bank Transfer (UK Local account)

£0.79

Outgoing Bank Transfer (EU SEPA)

€0.99

Incoming Bank Transfer (EU SEPA)

€0.89

Outgoing Bank Transfer (EU SEPA) - Urgent

€2.00

Incoming Bank Transfer (EU SEPA) - Urgent

€1.00

Incoming Bank Transfer USD

$20.00

International Payment (SWIFT PAYMENT)

Incoming in GBP via Swift international

£15.00

Outgoing in GBP via Swift international

£25.00

Incoming in EUR via Swift international

€20.00

Outgoing in EUR via Swift international

€30.00

Incoming in USD via Swift international

$20.00

Outgoing in USD via Swift international - Not Available

$35

Bank Services Fee

Bank Swift Message (proof of payment for bank trace)

£15.00

Changing Conversation date

£15.00

FX Fee (Between the account)

FX margins from 40 basis points (0.40%) depend on trade volume

From 0.40%

   

Please note: Online Banking will be lock if system unable to redeem System Monthly Service

 

 

วันอังคาร, 27 เมษายน 2564 09:27

Landing Page Exist

Slide background

A&B Plus Online account platform

A&B Plus Online account platform

เปิดบัญชีฟรีทันที

ยังไม่สนใจ

เรทสูงกระชากใจ ในราคาเพียง 1 ปอนด์/ยูโร

รับเงินทันที 50 ปอนด์/ยูโร เมื่อชวนเพื่อนมาเปิดบัญชีกับเรา

รับสิทธิ์โอนฟรีตามจำนวนเพื่อนที่แนะนำมา ยิ่งเยอะ ยิ่งได้เยอะ

รับโบนัสจากเราตลอดชีพ เมื่อเพื่อนที่คุณแนะนำเริ่มใช้บัญชี A&B Plus

โอนเงินกลับไทยเหนือใคร เมื่อเปิดบัญชี A&B Plus กับเรา

หาเงินง่ายๆ กับ A&B Plus

ฟรีไม่อั้น เมื่อโอนจาก THAI-UK หรือ THAI-EURO

เปิดง่าย อนุมัติไว ไม่กระทบเรื่องภาษี

เป็นบัญชีธนาคารไว้รับ-จ่ายทั้งใน และต่างประเทศ

ตรวจสอบ สั่งจ่ายด้วยตัวเองได้ ตลอด 24 ชม

เลือกเปิดได้หลากหลายสกุลเงิน เช่น GBP / EUR / USD

ข้อมูลเพิ่มเติม

Slide background

สิทธิพิเศษมากกว่า เมื่อเปิดบัญชี A&B PLUS กับเรา

เรทสูง กระชากใจ!!

ฟรีไม่อั้น!!!

ได้รับเรทเงินเพิ่มมากขึ้น มากกว่าปรกติ ตลอดอายุการใช้งาน เมื่อคุณเปิดบัญชี A&B Money Plus กับเรา.

ฟรีค่าโอนทุกรายการ เมื่อคุณโอนเงิน จากเมืองไทย เป็น ปอนด์ หรือ ยูโร เข้าบัญชี A&B Money Plus และรับเงินทันทีภายในวันเดียวกัน

เปิดง่าย อนุมัติไว ไม่กระทบเรื่องภาษี

ใช้จับจ่ายทั้งใน และต่างประเทศ

ตรวจสอบ / สั่งจ่าย ตลอด 24 ชม .

สมัครฟรี ผ่านออนไลน์ ง่าย สะดวก รวดเร็ว ไม่เช็คเครดิตสกอ ไม่กระทบภาษี และไม่เสี่ยงถูกปิดบัญชี

บัญชีสามารรับ และสั่งจ่ายได้ทั้งภายใน UK (Sort Code) / EUR (IBAN) และต่างประเทศทั่วโลกในระบบ SWIFT ที่รับเงินจากทั่วโลก

เปิดได้หลากหลายสกุลเงิน

สามารถเช็คยอดเงิน โอนเข้า-ออก ได้ด้วยตัวเอง ตลอด 24 ชม ผ่านทาง คอมพิวเตอร์ และแอปพิเคชั่น

เลือกเปิดได้หลากหลายสกุลเงิน เช่น GBP / EUR / USD มีตัวเลือกให้เปิดได้ถึง 3 สกุลเงิน ที่คุณต้องการ

หาเงินง่ายๆ กับ A&B PlUS

ช่องทางการทำรายได้ แบบง่ายๆ และได้กันไปเลยแบบฟรีๆ

1

ชวนเพื่อนมารับตัง

ง่ายๆ ได้ฟรีๆ เพียงแค่ชวนเพื่อนมาเปิดบัญชีกับเรา ก็รับไปเลย 50 ปอนด์/ยูโร เข้าไปในบัญชีทันที จนคุณต้องร้องว่าวะวะว้าวววววว!!!

2

โอนฟรี ฟรีแล้วฟรีอีก!

รับสิทธิ์โอนฟรีตามจำนวนเพื่อนที่แนะนำมา ยิ่งเยอะ ยิ่งได้เยอะ แนะนำมา 1 คน ก็รับโอนฟรี 1 ครั้ง / แนะนำมา 100 คน ก็รับโอนฟรีไปเลย 100 ครั้ง !!!

3

รับโบนัสตลอดชีพ

เมื่อคุณแนะนำให้เพื่อนๆ เปิดบัญชี และเริ่มใช้บัญชี เพียงแค่นี้ คุณก็จะได้รับโบนัสเข้าไปในบัญชีของคุณตลอดชีพ!!

Slide thumbnail

BANK

เป็นบัญชีธนาคารของคุณในต่างประเทศ

A&B Money Plus ที่จะทำให้ชีวิตคุณดีขึ้น และง่ายขึ้น ด้านอิสระภาพทางการเงินในระบบบัญชีธนาคารที่มีความปลอดภัยสูง มีสามารถบริหารการจัดการได้เพียงแค่นิ้วสัมผัสผ่านมือถือ และคอมพิวเตอร์ตลอด 24 ชั่วโมง ภายใต้ 2 สกุลหลัก คือ เงินปอนด์ (GBP) และเงินยูโร (EUR) ที่ทำให้คุณไม่ต้องไปปวดหัว และเสียเวลากับระบบธนาคารเดิมๆ ตามท้องถนนอีกต่อไป

คุณจะได้รับ Account number + Sort Code สำหรับบัญชีเงินปอนด์ (GBP) และ IBAN + Swift Code สำหรับเงินยูโร (EUR) 36.9 ล้าน ร้านค้าทั่วโลกที่มีสัญลักษณ์ Mastercard ใช้เป็นบัญชีเพื่อรับจากพ่อแม่ในเมืองไทยสำหรับวีซ่านักเรียน หรือจะเป็นบัญชีที่รับเงินเดือน หรือกระแสรายวันสำหรับวัยทำงาน

คุณสามารถตั้งค่าใช้จ่ายประจำ เช่น จ่ายค่าน้ำ-ค่าไฟ ในระบบ Standing Order หรือจ่ายค่าบิลโทรศัพท์มือถืออัตโนมัติในระบบ Direct Debit ได้ รวมถึงการสั่งจ่าย online banking ทั้งใน และต่างประเทศได้โดยไม่มีเงื่อนไข ตลอดจนเช็คเสตทเม้นส์ย้อนหลังหรือปริ้นออกมาเพื่อทำธุรกรรมรับรองด้านการเงินกับภาคเอกชน หรือรัฐบาล ซึ่งจะได้รับการยอมรับจากนาม Mastercard ได้ทั่วโลก

เปิดบัญชีเลย

Slide thumbnail

SHOPPING

เป็นบัตรธนาคารใบเดียว

ที่มาพร้อมกันถึง 2 สกุลเงิน

คุณจะได้รับบัตร Mastercard Prepaid Card ส่งตรงถึงหน้าบ้านคุณหลังจากเปิดบัญชีธนาคารกับเรา ซึ่งในบัตรนั้นจะมีถึง 2 สกุลเงินที่คุณสามารถจับจ่ายใช้สอยตามร้านค้าตามท้องถนน หรือออนไลน์ได้มากถึง 30 ล้านแห่งทั่วโลกที่ยอมรับบัตร Mastercard

บัตรได้ถูกออกแบบให้มีความปลอดภัยสูงเพื่อป้องกันมิจฉาชีพ และผู้ประสงค์ร้ายในระบบบัญชี ซึ่งเราจะจัดส่งรหัสลับผ่านโทรศัพท์มือถือของลูกค้าที่ขึ้นทะเบียนไว้ในระบบ และลูกค้าสามารถตั้งพาสเวิร์ดเพื่อเข้าระบบ online banking ของตนเองได้ผ่านหน้าทางหน้าเวปไซค์ของเรา ในการสร้างบัญชีเพื่อจ่ายเงินออนไลน์ หรือจ่ายเงินจะถูกควบคุมโดย Mastercard 3D Secured เพื่อสิทธิประโยชน์ และป้องกันมิจฉาชีพ (Hacker) ในระบบธนาคาร

เปิดบัญชีเลย

Slide thumbnail

TRAVELING

บัตรเดียวเที่ยวได้รอบโลก

บัตรคู่ใจที่จะเดินทางไปพร้อมกับคุณในการเดินทางต่างประเทศ ที่สะดวก และปลอดภัยกว่าการพกพาเงินสด ซึ่งแยกระบบบัญชีชัดเจนระหว่างเงินปอนด์ (GBP) และเงินยูโร (EUR) ออกจากกัน เพื่อให้คุณไม่สับสน และเสียค่าเรทสกุลเงินในระบบ Forex หรืออีกนัยนึงคือ จ่ายเงินสกุลไหน ก็ใช้บัญชีสกุลนั้นนั่นเอง เติมเต็มความสุขในชีวิตการท่องเที่ยว เดินทางเพื่อธุรกิจ ใช้ชีวิตต่างแดน ภายใต้อำนาจของ Mastercard ที่จับจ่ายได้ทุกร้านค้า หรือกดเงินสดผ่านตู้ ATM ได้ทั่วโลกมากถึง 750 ปอนด์/ยูโร ต่อวัน

เปิดบัญชีเลย

Slide thumbnail

FAMILY

บัตรเสริมสำหรับคนที่คุณรัก

คุณสามารถเปิดบัตรเสริมให้กับสมาชิกในครอบครัว หรือคนที่คุณรักได้มากถึง 3 ใบ ต่อการเปิด 1 บัญชีธนาคารกับเรา สำหรับบัตรเสริมที่คุณขอสั่งเพิ่มจากเราจะถูกจัดส่งไปยังหน้าบ้านของคุณภายในยุโรป และคุณก็สามารถจัดส่งไปให้สมาชิกในครอบครัวที่เมืองไทย หรือที่ไหนก็ตามในโลกได้ สำหรับบัตรเสริมนั้นจะสามารถไปกดเงินจากตู้ ATM หรือจับจ่ายใช้สอยตามร้านค้า หรือ shopping online ได้ทั่วโลก ซึ่งจะเชื่อมกับเงินในบัญชีของคุณเป็นหลัก

ประโยชน์ในการมีบัตรเสริม คือ

- สามารถมองเห็นการจับจ่าย และควบคุมค่าใช้จ่ายของสมาชิกในครอบครัวได้

- เป็นจุดเริ่มต้นที่ดีที่จะสอนลูกในการใช้เงิน และบริหารเงินในบัญชี

- คล่องตัวมากขึ้นโดยไม่ต้องส่งเงินระหว่างประเทศ เพราะบัตรเสริมจะเชื่อมกับเงินในบัญชีของคุณ

- อำนาจการสั่งระงับ หรือเติมเงินลงในบัญชีอยู่ที่คุณเพียงคนเดียว

เปิดบัญชีเลย

ทําธุรกรรมออนไลน์ผ่านมือถือได้ง่ายๆ ตลอด 24 ชั้วโมง

A&B MONEY APP

เปิดบัญชีธนาคาร

สามารถเปิดบัญชีธนาคารผ่านทางแอพของเราได้ง่ายๆ สะดวก รวดเร็ว โดยอัพโหลดเอกสารจากคอมพิวเตอร์ หรือมือถือ ได้ด้ตลอด ทุกที่ ทุกเวลา เพียงแค่ปลลายนิ้วสัมผัส

ตรวจสอบบัญชี / สเตทเม้นท์

ตลอดจนเช็คเสตทเม้นส์ย้อนหลังหรือปริ้นออกมาเพื่อทำธุรกรรมรับรองด้านการเงินกับภาคเอกชน หรือรัฐบาล

โอนเงิน

สามารถแจ้งโอนเงินกลับไทย และทั่วโลก คอมพิวเตอร์ตลอด 24 ชั่วโมง ภายใต้ 2 สกุลหลัก คือ เงินปอนด์ (GBP) และเงินยูโร (EUR) ที่ทำให้คุณไม่ต้องไปปวดหัว และเสียเวลากับระบบธนาคารเดิมๆ

เช็คเรท / โปรโมชั่น

สามารถเช็คอัตราแลกเปลี่ยนประจำวัน และข่าวสารต่างๆ พร้อม โปรโมชั่นพิเศษมากมาย

Contactless Payment

การชำระเงินแบบง่ายๆ สะดวก และปลอดภัย จาก A&B MONEY PLUS

ปลอดภัยมากยิ่งขึ้น

ใช้ง่าย สะดวก รวดเร็ว

ไม่ต้องพกเงินสดให้หนักกระเป๋า

ช่วยให้การชำระเงินบนโทรศัพท์มือถือ ปลอดภัยยิ่งขึ้น

มอบวิธีการชำระสินค้าที่ปลอดภัย ง่ายดาย และรวดเร็ว ยิ่งขึ้น

ความสะดวกสบายที่เหนือกว่า หมดกังวลกับข้อจำกัดในการใช้ เงินสด

เปิดบัญชีฟรีทันที

ยังไม่สนใจ

เปิดบัญชีธนาคาร ฟรีเลยตอนนี้
คลิ๊ก!
 

วันจันทร์, 22 มีนาคม 2564 16:16

ข้อควรระวังจากมิจฉาชีพ

IT Security Awareness for Customers

Awareness and Knowledge for Online Banking Services:

Cybercriminal attacks on individuals most of the time so it is important to be aware of the threats and to approach anything on the internet that involves customer identity or account numbers with caution. Cyber criminals have several ways to steal identity such as creating fake websites that mimic legitimate sites such as PayPal or Some Banking Website to steal confidential information.

In some case, theft and fraud is committed by family members and friends or acquaintances of victims who, because of these relationships, have relatively easy access to account numbers and passwords saved on computers.


Security Practices list

  • Verify use of a secure session (https:// and not http://) when entering passwords on the internet.

  • Pay attention to the URL (web address) that you are visiting! Fraudulent websites often create misleading web address like https://www.somecompany.AnotherWebsite.com/ to trick users of a https://www.somecompany.com/ into believing they are visiting a legitimate site where they have an account when they are really at a password harvesting spoof of the legitimate website. This is a quite common trick that scammers use to fool users for steal passwords by fake copies of real websites

  • No website or service will ever lose a user’s login information and request that the user provide it to the website or company. Requests involving this sort of statement are always a scam and usually involve some sort of coercive statement such as threatening the loss of funds if login credentials are not supplied in time.

  • Avoid saving passwords to any computer.

  • Always use Log Out buttons when you are finished to end your secure sessions. This helps prevent session hijacking attacks where hackers keep sessions open when you think they have been closed.

  • Never leave computers unattended when using online banking services.

  • Never access sensitive computer systems or websites from public computers at a hotel, library, coffee shop or when using your own devices over any public wireless access point.

  • Offers for employment as a mystery shopper, payment processor, etc. where you are required to use your personal account for someone else’s business purposes are never legitimate.

  • No legitimate business will attempt to move business funds through anyone’s personal account.

Password Security:

It is difficult to the system to check that user who have the correct password is the truly account holder so it mostly important that customer must keep their passwords private and immediately report any suspected security violations. Below is a list of some common password choices and bad behavior to avoid:

  • Your name, or a family member or pet’s name

  • Social Security, account, or telephone numbers

  • Solitary word in any language. Hackers have dictionary-based systems to crack these types of passwords

  • Any part of your physical address

  • Anybody’s birth date

  • Other information that is easily obtained about the user

  • A word in the English or any foreign dictionary, even spelled backwards

  • A password used on another site

  • Sequences: “12345678”, or “33333333”, “abcdefgh”

  • Write your passwords down, share them with anyone or let anyone see you log into devices or websites.

  • Answer "yes" when prompted to save your password to a particular computer's browser.

 

The password choices and good behavior to do:

  • Use a combination of uppercase and lowercase letters, symbols, and numbers.

  • Make sure your user passwords are at least eight characters long. The more characters and symbols your passwords contain, the more difficult they are to guess.

  • Change your passwords regularly.

  • Log out of websites and devices when you are finished using them.


Aware of Cyber threats:

If customer know what kind of cyber threats they might face these days, then they can avoid and protect themselves better. The list of threats and how to handle show as below

Common spam email security threats:

Spam emails are annoying enough, but some of them can put your digital safety at risk. Some spam messages contain viruses, malware, and other cyberthreats. Here are a few to watch for.

Trojan horses

Trojan horses come disguised as a legitimate program. Even if the customer think they know how to verify whether an email is legitimate, a trojan horse uses deception to get past those defense mechanisms.

For instance, It can hide inside free software downloads or arrive as an email attachment, possibly from someone you know.

When open the email, the trojan installs malicious code — typically spyware or viruses — designed to create problems on their computer.

It may allow an attacker to control the computer, lock you out, steal the data, account information or email addresses. Installing anti-malware software may help you catch these trojans.

To help avoid trojan horses, avoid clicking on pop-up messages on the computer. If you are seeing a lot of pop-ups, consider running an antivirus scan.

Zombies

Zombies are a type of malware that also comes in email attachments. They turn the computer into a server and sends spam to other computers. Customer may not know that their computer is compromised, but it may slow down considerably, or the battery may drain quickly. Meanwhile, the computer may be sending out waves of spam or attacking web pages.

One way to avoid zombies is to avoid opening attachments or clicking links in emails from the spam folder.

Lottery scams and fake offers

Sometimes, cyber thieves use old-school scams that might seem legitimate but are fake offers. These play on customer desires or good nature: You've won a lot of money or someone urgently needs your help.

The customer has not won a lottery or a cruise around the world. And they have not been selected by a foreign prince to receive $10 million, in exchange for the use of their bank account number. Look for phrases of urgency like, “Immediate,” and “Act Now” in the email’s title to avoid lottery scams and fake offers. Refer to the Delete Emails section of this post for additional characteristics to look for.

How to stay spam free:

So far, there is no such thing as a "do not email" list for spam. Until there is, Customer will have to take care of spam themselves.

Fortunately, there are good tools to help you do that. Most email programs include spam filters that can help detect and isolate spam. Many internet service providers filter out spam, so it never reaches your computer. But it is wise to install and run anti-virus security software that can eliminate viruses that may already live on the computer.

Spam emails, otherwise known as junk mail, are uninvited bulk-sent email messages delivered to an inbox. You probably receive email spam and marketing messages regularly. But there is one difference between a spam message and marketing message: permission.

Spam messages often come from illegitimate email addresses and may contain explicit or illegal content. These emails often use scare tactics, contain typos and misleading information, and are sent in bulk from an anonymous sender. They seldom contain an unsubscribe link, and if it does, that link may be embedded with malware. This could lead to cybercriminals gaining access to your computer, smartphone, and other devices.

There are ways to help slow the tide of unwanted emails. So, here are the few simple ways you can take to help eliminate spam emails.

1. Mark as spam

Most email services, such as Gmail, Yahoo Mail, Microsoft Outlook, and Apple Mail have algorithms that filter out spam and junk mail by tucking them away in a folder.

But if customer find a spam email in their regular inbox, don't delete the message — mark it as spam. Marking a suspicious email as spam will send it to the spam folder. Moving forward, if you receive any more emails from this address, the spam filter will know no to let it into your inbox.

2. Delete spam emails

There is a golden rule to dealing with spam emails: if it looks like a spam message, it probably is — so delete it without clicking or downloading anything. If the message in question appears to come from someone you know, contact them outside of your email.

3. Keep your email address private

Giving out your email address can increase the amount of spam email you receive. So, if it’s not essential to share, keep it private. Also, consider changing your email privacy settings.

4. Unsubscribe from email lists

Unsubscribing from email lists is an ideal way to keep out from spam email. Marketers often get the customer email address from online forms, social media, and scraping tools, and purchase customer information from other companies. So, the less they subscribe to, the less these marketers and spammers can find your address.

 

Common Phishing threats:

Phishing is a cybercrime in which scammers try to lure sensitive information or data from you, by disguising themselves as a trustworthy source. Phishers use multiple platforms.

How does phishing work?

  1. The phisher begins by determining who their targeted victims will be (whether at an organization or individual level) and creates strategies to collect data they can use to attack.

  2. Next, the phisher will create methods like fake emails or phony web pages to send messagesthat lure data from their victims.

  3. Phishers then send messages that appear trustworthyto the victims and begin the attack.

  4. Once the attack has been deployed, phishers will monitor and collect the datathat victims provide on the fake web pages.

  5. Finally, phishers use the collected data to make illegal purchases or commit fraudulent acts.

 

Types of phishing attacks


1. Email Phishing

The basic phishing email is sent by fraudsters impersonating legitimate companies, often banks or credit card providers. These emails are designed to trick you into providing log-in information or financial information, such as credit card numbers or Social Security numbers.

Other spoof emails might try to trick the customer into clicking a link that leads to a fake website designed to look like Amazon, eBay, or bank. These fake websites can then install malware or other viruses directly onto the computer, allowing hackers to steal personal information or take control of the computer, tablet, or smartphone.

How to recognize phishing emails

Scammers have become more sophisticated when it comes to sending out phishing emails. But there are still some signs the customer can look for:

  • Too good to be true offers.Phishing emails may try to hook you with what appears to be incredibly cheap offers for things like smartphones or vacations. The offers may look irresistible but resist them. They are likely phishing emails.

  • A bank — maybe not even your own — is asking for your account information or other personal financial information.Your bank, or any financial institution, will never ask for your Social Security number, bank account number, or PIN by email. Never provide this information in response to an email.

  • Spelling and grammatical mistakes.There was a time when you could easily spot phishing emails because they were littered with spelling and grammar mistakes. Scammers have gotten better at avoiding these errors, but if you do receive an email littered with typos and weird language, that email might be sent from someone phishing.

  • The generic greeting.Phishing emails might not be addressed specifically to you. Instead, the email might start with a generic greeting such as “Dear Sir or Madam” or “Dear Account Holder.”

  • A call for immediate action.Phishers want you to act quickly, without thinking. That is why many will send emails asking you to immediately click on a link or send account information to avoid having your bank account or credit card suspended. Never reply hastily to an emergency request. Urgent requests for action are often phishing scams.

  • Senders you do not recognize.If you do not recognize the sender of an email, consider deleting it. If you do decide to read it, be careful not to click on links or download files.

  • Senders you think you recognize.You might get a phishing email from a name you recognize. But here is the catch: That email may have come from the compromised email account of someone you know. If the email requests personal information or money, it is likely it’s a phishing email.

  • If you receive an email that requests you click on an unknown hyperlink, hovering over the option might show you that the link is really taking you to a fake, misspelled domain. This link is created to look legitimate but is likely a phishing scam.

  • The sender included attachments that do not make sense or appear spammy.

 

2.Pop-up phishing

Pop-up phishing is a scam in which pop-up ads trick users into installing malware on their computers or convince them to purchase antivirus protection they do not need.

These pop-up ads sometimes use scare tactics. A common pop-up phishing example is when an ad might pop up on a user’s screen warning the user that their computer has been infected and the only way to remove the virus is by installing a particular type of antivirus software.

Once the user installs this software, it either does not work or, worse, does infect the computer with malware.

 

How can I protect myself from phishing attempts?

Though hackers are constantly coming up with new phishing techniques, there is good news. There are some things that customer can do to protect themselves and their organization. All it requires is some common sense.

  • Do not open suspicious emails.If customer receive an email supposedly from a financial institution with an alarming subject line — such as “Account suspended!” or “Funds on hold” — delete it. If the customer is worried that there is a problem, log in to the account or contact the bank directly. If there really is a problem with the bank account or credit card, they can find information once they have logged in.

  • Do not click on suspicious links in emails.If the customer does open an email from someone they do not know and instructed to click on a link, do not. Often, these links will take you to fake websites that will then encourage them to either provide personal information or to click on links that might install malware on your computer.

  • Do not send financial information through email.their bank or credit card provider will never ask them to provide bank account numbers, Social Security number, or passwords through email.

  • Do not click on pop-up ads.Hackers can add fraudulent messages that pop up when visit even legitimate websites. Often, the pop-ups will warn the customer that their computer is infected and instruct them to call a phone number or install antivirus protection. Avoid this temptation. Scammers use these ads to either install malware on the computer or scam out for payment for a computer clean-up they do not need.

  • Use spam filters.Spam filters can help block emails from illegitimate sources, but the customer should always use best judgment in case phishing emails get past your blocker.

  • Sign up for antivirus protection.Make sure the computer is protected by strong, multi-layered security software.

Installing and running trusted security software may provide real-time threat protection, help them create and manage unique passwords, and help protect personal files and financial information from phishing attacks and other scams.

 

How to recover after responding to a phishing email

  • Change your passwords:Make sure to change the passwords they use for their banking, credit card and other accounts. Use a combination of numbers, letters, and symbols to make these passwords more difficult to crack. Consider enabling multi-factor authentication if it is available. Multi-factor authentication requires entering a second piece of information — such as a code sent to your smartphone — to access an account.

  • Contact your credit card providers:If the customer has given up credit card information, immediately call the credit card providers. They can freeze the account credit to prevent unauthorized purchases. They can also work with customer to determine which purchases on the accounts are legitimate and which were made by criminals.

  • Check your credit reports:Order free copies of the customer credit reports from Credit Report provider. Check these reports carefully for any unfamiliar activity to make sure no one has opened credit card accounts or loans in the customer’s name.

  • Study your credit card statements:Be on the lookout for any unauthorized or suspicious charges.

 

 

 

วันจันทร์, 22 มีนาคม 2564 16:16

ระบบป้องกันจาก Application

Mobile Application Security

Payment Services Directive 2 is the new regulatory standards requires to payment service providers to follow and integrated for secure and efficient payment process. A&B Money have Apps service provided to our customer under Google Play and Apple App Store which is affect directly by PSD2 under Subject of Common and Secure Communication (CSC).

Scope

To follow the PSD2 Compliance, A&B Money must update the Mobile Apps security to support the requirement of PSD2. The main thing of PSD2 is to protect consumers and to make the use of payment services safer. To meet these requirements, A&B Money should add security capabilities to the mobile apps for protect against known and unknown treats on users’ devices. At the same time, mobile banking apps should be able to detect when they are installed on risky devices and block access until those risks have been remediated.

Security Implement must have in any apps of A&B Money

  1. Mobile devices with access to the operating system are not permitted. (rooted / jailbroken) Access the app. To reduce the risk that malicious people can access the information of importance of service users and violate or avoid security measures provided by the service provider.

 

  1. Mobile devices running obsolete operating systems are not allowed. There are serious vulnerabilities announced by the international security agency. And affect the use of a broader user access to the application in case of obsolete OS There are other vulnerabilities that do not affect the broader user. There should be measures to mitigate the risk of the service provider. And service users as appropriate, such as notification of service users, limiting transaction limits and increasing Identity verification measures

 

  1. requesting access to resources or services by the application (application permission) on the user's mobile device as needed and there is a review process for permission. This is done regularly to prevent violations of the privacy rights of the users.

 

  1. Prevent important source codes such as money transfers, authentication, from Leaked from the application to reduce the risk that the malicious person modifies the source code.

 

  1. Prevent the implantation of sensitive information or malicious code. On the application

 

  1. Files encryption that is stored for Important information on mobile devices of users to protect information Significant loss of customers.

 

  1. Users are not allowed to use lower versions of the application. More than that specified by the service Provider To provide the application with a security that meets the standards of the service provider.

 

  1. Prevent Distributed denial-of-service (DDoS Attack) attacks. At the network layer (network layer) to protect the system from attacks and cannot provide services.

 

  1. Prevent threats from being intercepted or altered during transmission. (Man, in the Middle Attack) by confirming identity by Certificate Pinning technique or equivalent method, enforcing TLS version, use of secure communication channels (secure protocol) to transmit data.

 

  1. Prevent the identity of customers (Session Hijacking) and keylogger in mobile apps.

 

  1. Prevent unauthorized access to the host computer (server). Such as SQL Injection, Local File Inclusion or Directory Traversal. To reduce the risk of information leaks and system attacks.

 

Security Implement

Overlay Detection

This issue occurs in some mobile devices that have Android platform installed. Screen Overlay is a special permission granted to Android apps, with the help of which, apps can appear on top of another app screen. Nowadays, almost every app is using this permission to enhance its user experience.

 

Jailbreak & Root Detection

A&B Money takes privacy too seriously and how we handle personally identifiable information (PII) to protect your personal information accessed through A&B Money App. We block the operation of A&B Money App on devices that Root and jailbreak.

 

Active Memory Zeroing

Memory corruption bugs are a popular mainstay with hackers. This class of bug results from a programming error that causes the program to access an unintended memory location. Under the right conditions, attackers can capitalize on this behavior to hijack the execution flow of the vulnerable program and execute.

 

Secure Storage + Device Binding

Secure storage can be used to store sensitive information such as passwords, keys, certificates, etc. All the information in the secure storage is in encrypted format. And only access to your own secure storage

 

Anti-Code Injection

Identifying possible entry points for untrusted input then tracing from those locations to see if the destination contains potentially vulnerable functions. Identifying known, dangerous library / API calls (e.g., SQL queries) and then checking whether unchecked input successfully interfaces with respective queries.

 

Anti-Key Logging

Detect that your application is deployed in a compromised environment and take preventive actions (e.g., terminate the application). Disallow the use of non-standard/non-official keyboards from within your application.

 

Anti-Screen Reader

The screen magnifier, braille output device, on-screen keyboard should be detected, voice recognition, etc.

 

Debugger & VM Debuggers Prevention

Anti-debugging is an anti-analysis technique that is used by malware to check if it is being debugged. Malware authors use many techniques to prevent and or slow the reverse engineer from debugging their code.

 

Runtime Protection – Integrity Check

They can protect themselves from runtime analyzes and live attacks. Mechanisms monitor the health of applications and the environment in which they are running in real time. When a threat is detected, the application will respond in a pre-programmed manner. Possible reactions range from showing security alerts to terminating user sessions and applications, in addition to helping secure communication between the mobile application and the server.

 

Emulator Detection

To prevent protected applications from running within the emulator. (Simulated Environment) To prevent mobile apps from running on emulators, an effective emulator must be detected first.

 

Obfuscation

Renaming functions, methods, classes to use less descriptive names. Additional techniques include deleting debugging information such as type, source file parameter and line number, as well as deleting annotations.

 

Self-Shutdown

It actively detects malicious key logging, screen readers, repackaged applications, debuggers, and emulators, and jailbroken or rooted devices. It can then react to prevent screenshots, block screen duplication, or enable customized actions based on business policy (i.e. Application shut down).

 

 

 

วันจันทร์, 22 มีนาคม 2564 16:16

มาตรฐานการป้องกันของระบบ

Remote monitoring

and

Management IT Resources

 

Manage the several Computers in organization can be hard work and really need a lot of time to make sure any IT asset have firmware and software up to date. Remote monitoring and management IT Resources Tool will be the one point of control that improve security and reduce risk in the organization in several way:

  1. Reliability and Productivity To make all the IT assets managed and maintained from one point in real time for ensure all uptime and performance. Reduce the IT support time and associated cost.

  2. Reduce Risk To detect and repair problems which is reduce overall downtime and security risk.

  3. Enhance IT Security To make sure all the IT assets have regular updates on operation systems and have all vulnerabilities patched.

Scope:

All of officer’s computer will be install the client software of Remote monitor and management tool. The software will monitor all the machine and network usage activity to the main Account that hold by authorized person and regular update patch to the system. Authorized persons have ability to control and remote to client computer for purpose of solve the technical issues.

 

Remote monitoring and Management Use

 

1.Monitor IT assets

All the computer in the organization will be monitor on the system, performance, resources and process, uptime logged in user and network usage in real-time. Management software will be installed on authorized control person’s smartphone to help and control from anywhere any time. Any critical IT system issue will be alert directly to authorized control person.

 

2.Automate Task

Support automate task under the policy IT resources usage such as automate backup specific folder or automate notification to authorized control person when system triggered.

 

3.Routine update and patch

Routine make as twice a week to check and install update to operation system and software. Vulnerabilities patch update and antivirus scan task run as daily. Authorized person can take control the update process or start the process instantly.

 

4.Control and Remote

Authorized control person can remote to client computer to control or operate under the purpose of work or solve the technical issues. Chat and file sharing feature support work remote.  Authorized control person allows to control and command such as Restart the machine or Shutdown the computer by use the main software or App.

 

5. Report

Report summary usage of all IT assets in organization to know the overall and detail that help the organization to plan and mange the resources the report will be cover as list

  • Summary monitor and resource report.

  • Any issue or critical error report in the last 30 days.

  • Patch and update log and track.

  • Network usage report.

 

 

 

วันเสาร์, 20 มีนาคม 2564 16:23

มาตรฐานการป้องกันของระบบ

Remote monitoring

and

Management IT Resources

 

Manage the several Computers in organization can be hard work and really need a lot of time to make sure any IT asset have firmware and software up to date. Remote monitoring and management IT Resources Tool will be the one point of control that improve security and reduce risk in the organization in several way:

  1. Reliability and Productivity To make all the IT assets managed and maintained from one point in real time for ensure all uptime and performance. Reduce the IT support time and associated cost.

  2. Reduce Risk To detect and repair problems which is reduce overall downtime and security risk.

  3. Enhance IT Security To make sure all the IT assets have regular updates on operation systems and have all vulnerabilities patched.

Scope:

All of officer’s computer will be install the client software of Remote monitor and management tool. The software will monitor all the machine and network usage activity to the main Account that hold by authorized person and regular update patch to the system. Authorized persons have ability to control and remote to client computer for purpose of solve the technical issues.

 

Remote monitoring and Management Use

 

1.Monitor IT assets

All the computer in the organization will be monitor on the system, performance, resources and process, uptime logged in user and network usage in real-time. Management software will be installed on authorized control person’s smartphone to help and control from anywhere any time. Any critical IT system issue will be alert directly to authorized control person.

 

2.Automate Task

Support automate task under the policy IT resources usage such as automate backup specific folder or automate notification to authorized control person when system triggered.

 

3.Routine update and patch

Routine make as twice a week to check and install update to operation system and software. Vulnerabilities patch update and antivirus scan task run as daily. Authorized person can take control the update process or start the process instantly.

 

4.Control and Remote

Authorized control person can remote to client computer to control or operate under the purpose of work or solve the technical issues. Chat and file sharing feature support work remote.  Authorized control person allows to control and command such as Restart the machine or Shutdown the computer by use the main software or App.

 

5. Report

Report summary usage of all IT assets in organization to know the overall and detail that help the organization to plan and mange the resources the report will be cover as list

  • Summary monitor and resource report.

  • Any issue or critical error report in the last 30 days.

  • Patch and update log and track.

  • Network usage report.

 

 

 

วันเสาร์, 20 มีนาคม 2564 16:22

ระบบป้องกันจาก Application

Mobile Application Security

Payment Services Directive 2 is the new regulatory standards requires to payment service providers to follow and integrated for secure and efficient payment process. A&B Money have Apps service provided to our customer under Google Play and Apple App Store which is affect directly by PSD2 under Subject of Common and Secure Communication (CSC).

Scope

To follow the PSD2 Compliance, A&B Money must update the Mobile Apps security to support the requirement of PSD2. The main thing of PSD2 is to protect consumers and to make the use of payment services safer. To meet these requirements, A&B Money should add security capabilities to the mobile apps for protect against known and unknown treats on users’ devices. At the same time, mobile banking apps should be able to detect when they are installed on risky devices and block access until those risks have been remediated.

Security Implement must have in any apps of A&B Money

  1. Mobile devices with access to the operating system are not permitted. (rooted / jailbroken) Access the app. To reduce the risk that malicious people can access the information of importance of service users and violate or avoid security measures provided by the service provider.

 

  1. Mobile devices running obsolete operating systems are not allowed. There are serious vulnerabilities announced by the international security agency. And affect the use of a broader user access to the application in case of obsolete OS There are other vulnerabilities that do not affect the broader user. There should be measures to mitigate the risk of the service provider. And service users as appropriate, such as notification of service users, limiting transaction limits and increasing Identity verification measures

 

  1. requesting access to resources or services by the application (application permission) on the user's mobile device as needed and there is a review process for permission. This is done regularly to prevent violations of the privacy rights of the users.

 

  1. Prevent important source codes such as money transfers, authentication, from Leaked from the application to reduce the risk that the malicious person modifies the source code.

 

  1. Prevent the implantation of sensitive information or malicious code. On the application

 

  1. Files encryption that is stored for Important information on mobile devices of users to protect information Significant loss of customers.

 

  1. Users are not allowed to use lower versions of the application. More than that specified by the service Provider To provide the application with a security that meets the standards of the service provider.

 

  1. Prevent Distributed denial-of-service (DDoS Attack) attacks. At the network layer (network layer) to protect the system from attacks and cannot provide services.

 

  1. Prevent threats from being intercepted or altered during transmission. (Man, in the Middle Attack) by confirming identity by Certificate Pinning technique or equivalent method, enforcing TLS version, use of secure communication channels (secure protocol) to transmit data.

 

  1. Prevent the identity of customers (Session Hijacking) and keylogger in mobile apps.

 

  1. Prevent unauthorized access to the host computer (server). Such as SQL Injection, Local File Inclusion or Directory Traversal. To reduce the risk of information leaks and system attacks.

 

Security Implement

Overlay Detection

This issue occurs in some mobile devices that have Android platform installed. Screen Overlay is a special permission granted to Android apps, with the help of which, apps can appear on top of another app screen. Nowadays, almost every app is using this permission to enhance its user experience.

 

Jailbreak & Root Detection

A&B Money takes privacy too seriously and how we handle personally identifiable information (PII) to protect your personal information accessed through A&B Money App. We block the operation of A&B Money App on devices that Root and jailbreak.

 

Active Memory Zeroing

Memory corruption bugs are a popular mainstay with hackers. This class of bug results from a programming error that causes the program to access an unintended memory location. Under the right conditions, attackers can capitalize on this behavior to hijack the execution flow of the vulnerable program and execute.

 

Secure Storage + Device Binding

Secure storage can be used to store sensitive information such as passwords, keys, certificates, etc. All the information in the secure storage is in encrypted format. And only access to your own secure storage

 

Anti-Code Injection

Identifying possible entry points for untrusted input then tracing from those locations to see if the destination contains potentially vulnerable functions. Identifying known, dangerous library / API calls (e.g., SQL queries) and then checking whether unchecked input successfully interfaces with respective queries.

 

Anti-Key Logging

Detect that your application is deployed in a compromised environment and take preventive actions (e.g., terminate the application). Disallow the use of non-standard/non-official keyboards from within your application.

 

Anti-Screen Reader

The screen magnifier, braille output device, on-screen keyboard should be detected, voice recognition, etc.

 

Debugger & VM Debuggers Prevention

Anti-debugging is an anti-analysis technique that is used by malware to check if it is being debugged. Malware authors use many techniques to prevent and or slow the reverse engineer from debugging their code.

 

Runtime Protection – Integrity Check

They can protect themselves from runtime analyzes and live attacks. Mechanisms monitor the health of applications and the environment in which they are running in real time. When a threat is detected, the application will respond in a pre-programmed manner. Possible reactions range from showing security alerts to terminating user sessions and applications, in addition to helping secure communication between the mobile application and the server.

 

Emulator Detection

To prevent protected applications from running within the emulator. (Simulated Environment) To prevent mobile apps from running on emulators, an effective emulator must be detected first.

 

Obfuscation

Renaming functions, methods, classes to use less descriptive names. Additional techniques include deleting debugging information such as type, source file parameter and line number, as well as deleting annotations.

 

Self-Shutdown

It actively detects malicious key logging, screen readers, repackaged applications, debuggers, and emulators, and jailbroken or rooted devices. It can then react to prevent screenshots, block screen duplication, or enable customized actions based on business policy (i.e. Application shut down).

 

 

 

วันเสาร์, 20 มีนาคม 2564 16:18

ข้อควรระวังจากมิจฉาชีพ

IT Security Awareness for Customers

Awareness and Knowledge for Online Banking Services:

Cybercriminal attacks on individuals most of the time so it is important to be aware of the threats and to approach anything on the internet that involves customer identity or account numbers with caution. Cyber criminals have several ways to steal identity such as creating fake websites that mimic legitimate sites such as PayPal or Some Banking Website to steal confidential information.

In some case, theft and fraud is committed by family members and friends or acquaintances of victims who, because of these relationships, have relatively easy access to account numbers and passwords saved on computers.


Security Practices list

  • Verify use of a secure session (https:// and not http://) when entering passwords on the internet.

  • Pay attention to the URL (web address) that you are visiting! Fraudulent websites often create misleading web address like https://www.somecompany.AnotherWebsite.com/ to trick users of a https://www.somecompany.com/ into believing they are visiting a legitimate site where they have an account when they are really at a password harvesting spoof of the legitimate website. This is a quite common trick that scammers use to fool users for steal passwords by fake copies of real websites

  • No website or service will ever lose a user’s login information and request that the user provide it to the website or company. Requests involving this sort of statement are always a scam and usually involve some sort of coercive statement such as threatening the loss of funds if login credentials are not supplied in time.

  • Avoid saving passwords to any computer.

  • Always use Log Out buttons when you are finished to end your secure sessions. This helps prevent session hijacking attacks where hackers keep sessions open when you think they have been closed.

  • Never leave computers unattended when using online banking services.

  • Never access sensitive computer systems or websites from public computers at a hotel, library, coffee shop or when using your own devices over any public wireless access point.

  • Offers for employment as a mystery shopper, payment processor, etc. where you are required to use your personal account for someone else’s business purposes are never legitimate.

  • No legitimate business will attempt to move business funds through anyone’s personal account.

Password Security:

It is difficult to the system to check that user who have the correct password is the truly account holder so it mostly important that customer must keep their passwords private and immediately report any suspected security violations. Below is a list of some common password choices and bad behavior to avoid:

  • Your name, or a family member or pet’s name

  • Social Security, account, or telephone numbers

  • Solitary word in any language. Hackers have dictionary-based systems to crack these types of passwords

  • Any part of your physical address

  • Anybody’s birth date

  • Other information that is easily obtained about the user

  • A word in the English or any foreign dictionary, even spelled backwards

  • A password used on another site

  • Sequences: “12345678”, or “33333333”, “abcdefgh”

  • Write your passwords down, share them with anyone or let anyone see you log into devices or websites.

  • Answer "yes" when prompted to save your password to a particular computer's browser.

 

The password choices and good behavior to do:

  • Use a combination of uppercase and lowercase letters, symbols, and numbers.

  • Make sure your user passwords are at least eight characters long. The more characters and symbols your passwords contain, the more difficult they are to guess.

  • Change your passwords regularly.

  • Log out of websites and devices when you are finished using them.


Aware of Cyber threats:

If customer know what kind of cyber threats they might face these days, then they can avoid and protect themselves better. The list of threats and how to handle show as below

Common spam email security threats:

Spam emails are annoying enough, but some of them can put your digital safety at risk. Some spam messages contain viruses, malware, and other cyberthreats. Here are a few to watch for.

Trojan horses

Trojan horses come disguised as a legitimate program. Even if the customer think they know how to verify whether an email is legitimate, a trojan horse uses deception to get past those defense mechanisms.

For instance, It can hide inside free software downloads or arrive as an email attachment, possibly from someone you know.

When open the email, the trojan installs malicious code — typically spyware or viruses — designed to create problems on their computer.

It may allow an attacker to control the computer, lock you out, steal the data, account information or email addresses. Installing anti-malware software may help you catch these trojans.

To help avoid trojan horses, avoid clicking on pop-up messages on the computer. If you are seeing a lot of pop-ups, consider running an antivirus scan.

Zombies

Zombies are a type of malware that also comes in email attachments. They turn the computer into a server and sends spam to other computers. Customer may not know that their computer is compromised, but it may slow down considerably, or the battery may drain quickly. Meanwhile, the computer may be sending out waves of spam or attacking web pages.

One way to avoid zombies is to avoid opening attachments or clicking links in emails from the spam folder.

Lottery scams and fake offers

Sometimes, cyber thieves use old-school scams that might seem legitimate but are fake offers. These play on customer desires or good nature: You've won a lot of money or someone urgently needs your help.

The customer has not won a lottery or a cruise around the world. And they have not been selected by a foreign prince to receive $10 million, in exchange for the use of their bank account number. Look for phrases of urgency like, “Immediate,” and “Act Now” in the email’s title to avoid lottery scams and fake offers. Refer to the Delete Emails section of this post for additional characteristics to look for.

How to stay spam free:

So far, there is no such thing as a "do not email" list for spam. Until there is, Customer will have to take care of spam themselves.

Fortunately, there are good tools to help you do that. Most email programs include spam filters that can help detect and isolate spam. Many internet service providers filter out spam, so it never reaches your computer. But it is wise to install and run anti-virus security software that can eliminate viruses that may already live on the computer.

Spam emails, otherwise known as junk mail, are uninvited bulk-sent email messages delivered to an inbox. You probably receive email spam and marketing messages regularly. But there is one difference between a spam message and marketing message: permission.

Spam messages often come from illegitimate email addresses and may contain explicit or illegal content. These emails often use scare tactics, contain typos and misleading information, and are sent in bulk from an anonymous sender. They seldom contain an unsubscribe link, and if it does, that link may be embedded with malware. This could lead to cybercriminals gaining access to your computer, smartphone, and other devices.

There are ways to help slow the tide of unwanted emails. So, here are the few simple ways you can take to help eliminate spam emails.

1. Mark as spam

Most email services, such as Gmail, Yahoo Mail, Microsoft Outlook, and Apple Mail have algorithms that filter out spam and junk mail by tucking them away in a folder.

But if customer find a spam email in their regular inbox, don't delete the message — mark it as spam. Marking a suspicious email as spam will send it to the spam folder. Moving forward, if you receive any more emails from this address, the spam filter will know no to let it into your inbox.

2. Delete spam emails

There is a golden rule to dealing with spam emails: if it looks like a spam message, it probably is — so delete it without clicking or downloading anything. If the message in question appears to come from someone you know, contact them outside of your email.

3. Keep your email address private

Giving out your email address can increase the amount of spam email you receive. So, if it’s not essential to share, keep it private. Also, consider changing your email privacy settings.

4. Unsubscribe from email lists

Unsubscribing from email lists is an ideal way to keep out from spam email. Marketers often get the customer email address from online forms, social media, and scraping tools, and purchase customer information from other companies. So, the less they subscribe to, the less these marketers and spammers can find your address.

 

Common Phishing threats:

Phishing is a cybercrime in which scammers try to lure sensitive information or data from you, by disguising themselves as a trustworthy source. Phishers use multiple platforms.

How does phishing work?

  1. The phisher begins by determining who their targeted victims will be (whether at an organization or individual level) and creates strategies to collect data they can use to attack.

  2. Next, the phisher will create methods like fake emails or phony web pages to send messagesthat lure data from their victims.

  3. Phishers then send messages that appear trustworthyto the victims and begin the attack.

  4. Once the attack has been deployed, phishers will monitor and collect the datathat victims provide on the fake web pages.

  5. Finally, phishers use the collected data to make illegal purchases or commit fraudulent acts.

 

Types of phishing attacks


1. Email Phishing

The basic phishing email is sent by fraudsters impersonating legitimate companies, often banks or credit card providers. These emails are designed to trick you into providing log-in information or financial information, such as credit card numbers or Social Security numbers.

Other spoof emails might try to trick the customer into clicking a link that leads to a fake website designed to look like Amazon, eBay, or bank. These fake websites can then install malware or other viruses directly onto the computer, allowing hackers to steal personal information or take control of the computer, tablet, or smartphone.

How to recognize phishing emails

Scammers have become more sophisticated when it comes to sending out phishing emails. But there are still some signs the customer can look for:

  • Too good to be true offers.Phishing emails may try to hook you with what appears to be incredibly cheap offers for things like smartphones or vacations. The offers may look irresistible but resist them. They are likely phishing emails.

  • A bank — maybe not even your own — is asking for your account information or other personal financial information.Your bank, or any financial institution, will never ask for your Social Security number, bank account number, or PIN by email. Never provide this information in response to an email.

  • Spelling and grammatical mistakes.There was a time when you could easily spot phishing emails because they were littered with spelling and grammar mistakes. Scammers have gotten better at avoiding these errors, but if you do receive an email littered with typos and weird language, that email might be sent from someone phishing.

  • The generic greeting.Phishing emails might not be addressed specifically to you. Instead, the email might start with a generic greeting such as “Dear Sir or Madam” or “Dear Account Holder.”

  • A call for immediate action.Phishers want you to act quickly, without thinking. That is why many will send emails asking you to immediately click on a link or send account information to avoid having your bank account or credit card suspended. Never reply hastily to an emergency request. Urgent requests for action are often phishing scams.

  • Senders you do not recognize.If you do not recognize the sender of an email, consider deleting it. If you do decide to read it, be careful not to click on links or download files.

  • Senders you think you recognize.You might get a phishing email from a name you recognize. But here is the catch: That email may have come from the compromised email account of someone you know. If the email requests personal information or money, it is likely it’s a phishing email.

  • If you receive an email that requests you click on an unknown hyperlink, hovering over the option might show you that the link is really taking you to a fake, misspelled domain. This link is created to look legitimate but is likely a phishing scam.

  • The sender included attachments that do not make sense or appear spammy.

 

2.Pop-up phishing

Pop-up phishing is a scam in which pop-up ads trick users into installing malware on their computers or convince them to purchase antivirus protection they do not need.

These pop-up ads sometimes use scare tactics. A common pop-up phishing example is when an ad might pop up on a user’s screen warning the user that their computer has been infected and the only way to remove the virus is by installing a particular type of antivirus software.

Once the user installs this software, it either does not work or, worse, does infect the computer with malware.

 

How can I protect myself from phishing attempts?

Though hackers are constantly coming up with new phishing techniques, there is good news. There are some things that customer can do to protect themselves and their organization. All it requires is some common sense.

  • Do not open suspicious emails.If customer receive an email supposedly from a financial institution with an alarming subject line — such as “Account suspended!” or “Funds on hold” — delete it. If the customer is worried that there is a problem, log in to the account or contact the bank directly. If there really is a problem with the bank account or credit card, they can find information once they have logged in.

  • Do not click on suspicious links in emails.If the customer does open an email from someone they do not know and instructed to click on a link, do not. Often, these links will take you to fake websites that will then encourage them to either provide personal information or to click on links that might install malware on your computer.

  • Do not send financial information through email.their bank or credit card provider will never ask them to provide bank account numbers, Social Security number, or passwords through email.

  • Do not click on pop-up ads.Hackers can add fraudulent messages that pop up when visit even legitimate websites. Often, the pop-ups will warn the customer that their computer is infected and instruct them to call a phone number or install antivirus protection. Avoid this temptation. Scammers use these ads to either install malware on the computer or scam out for payment for a computer clean-up they do not need.

  • Use spam filters.Spam filters can help block emails from illegitimate sources, but the customer should always use best judgment in case phishing emails get past your blocker.

  • Sign up for antivirus protection.Make sure the computer is protected by strong, multi-layered security software.

Installing and running trusted security software may provide real-time threat protection, help them create and manage unique passwords, and help protect personal files and financial information from phishing attacks and other scams.

 

How to recover after responding to a phishing email

  • Change your passwords:Make sure to change the passwords they use for their banking, credit card and other accounts. Use a combination of numbers, letters, and symbols to make these passwords more difficult to crack. Consider enabling multi-factor authentication if it is available. Multi-factor authentication requires entering a second piece of information — such as a code sent to your smartphone — to access an account.

  • Contact your credit card providers:If the customer has given up credit card information, immediately call the credit card providers. They can freeze the account credit to prevent unauthorized purchases. They can also work with customer to determine which purchases on the accounts are legitimate and which were made by criminals.

  • Check your credit reports:Order free copies of the customer credit reports from Credit Report provider. Check these reports carefully for any unfamiliar activity to make sure no one has opened credit card accounts or loans in the customer’s name.

  • Study your credit card statements:Be on the lookout for any unauthorized or suspicious charges.

 

 

 

วันศุกร์, 04 ธันวาคม 2563 16:33

อัตราค่าบริการ

Business Account Price & Bank Fee Standard

 

  

 

ค่าธรรมเนียมการเปิดบัญชีธุรกิจ
ค่าธรรมเนียมการเปิดบัญชีสกุลเงิน GBP £150.00
ค่าธรรมเนียมการเปิดบัญชีสกุลเงิน EUR £150.00
ค่าธรรมเนียมการเปิดบัญชีสกุลเงิน USD £150.00
ธุรกิจที่มีความเสี่ยงสูง อย่างเช่น บริษัทโอนเงิน / บริษัทคลิปโต  From £2,000
   
   
ค่ารักษาบัญชีรายเดือน  
ค่ารักษาบัญชีสกุลเงิน GBP รายเดือน £50.00
ค่ารักษาบัญชีสกุลเงิน EUR รายเดือน €65.00
ค่ารักษาบัญชีสกุลเงิน USD รายเดือน $75.00
ค่าดูแลการปฎิบัติตามกฎหมายรายเดือน สำหรับ ธุรกิจการเงิน/ธุรกิจที่มีความเสี่ยงสูง £500.00
   
   
ค่าธรรมเนียมการใช้บัญชี  
โอนออกสกุลเงิน GBP (ในประเทศอังกฤษ) £0.99
รับเงินสกุลเงิน GBP (ในประเทศอังกฤษ) £0.79
โอนออกสกุลเงิน EUR (ในยุโรป) €0.99
รับเงินสกุลเงิน EUR (ในยุโรป) €0.89
รับเงินสกุลเงิน USD $20.00 
   
   
ค่าธรรมเนียมการใช้บัญชีระหว่างประเทศ (SWIFT PAYMENT)  
รับเงินสกุลเงิน GBP ระหว่างประเทศ £15.00
โอนออกสกุลเงิน GBP ระหว่างประเทศ £25.00
รับเงิน EURสกุลเงิน ระหว่างประเทศ €20.00
โอนออกสกุลเงิน EUR ระหว่างประเทศ €30.00
รับเงิน USD สกุลเงิน ระหว่างประเทศ $20.00
โอนออกสกุลเงิน USD ระหว่างประเทศ - ยังไม่พร้อมใช้งานในขณะนี้ $35.00
   
   
ค่าธรรมเนียมขของบริษัท  
เรียกขอหลักฐานการชำระเงินระหว่างธนาคาร (MT103) £15.00 
แก้ไข หรือเปลี่ยนแปลงวันที่การโอนเงิน £15.00 
   
   
ค่าธรรมเนียมการใช้บัตร  
ค่าธรรมเนียมการออกบัตร Debit Card £10.00
บัตรใหม่ กรณีบัตรหาย/ถูกขโมย £10.00
ถอน ATM ในประเทศ £250 /ครั้ง (ถอนได้ 4 ครั้ง/วัน) £3.00
ถอน ATM ต่างประเทศ (นอกสหภาพยุโรป) £10.00
เติมเงินผ่าน Debit/Credit Card (โดยเจ้าหน้าที่)  Minimum £1 or base on volume GBP 0.50% / 1.00%
โอนเงินระหว่างบัญชี AB Plus (ระบบ Instant Transfer) £0.50
ทำรายการผ่าน Debit/Credit (By Bank Staff) Free
เช็คยอดเงินผ่านตู้ ATM £0.99
เปลี่ยน PIN ผ่านตู้ ATM £0.99
ใช้บัตรซื้อของใน UK £0.50
ใช้บัตรซื้อของนอก UK GBP 1.00 plus 1.00%
POS/ATM ปฎิเสธ £0.50
PIN Reveal £2.00
แลกเปลี่ยนเงินตรา (ระหว่างบัญชีตนเอง) 0.50%
   
   

หมายเหตุ : Online Banking และ บัตรจะถูกล็อคอัตโนมัติหากระบบไม่สามารถเรียกเก็บค่าบริการรายเดือน จำนวน £50 / €65.00 / $75 (ขึ้นอยู่กับสกุลเงินของแต่ละบัญชี)
 

วันศุกร์, 04 ธันวาคม 2563 16:20

กฏหมายป้องกันข้อมูลความลับ

A&B GENERAL LIMITED 

DATA PROTECTION ADDENDUM RELATING TO THE PARTIES’ OBLIGATIONS UNDER THE

GENERAL DATA PROTECTION REGULATION EU 2016/679 (“GDPR”)



1. Scope and Applicability 

1.1 This Data Protection Addendum (“Addendum”) supplements the Payment Gateway Terms and Conditions (“Agreement”) between the parties. Any provision of the Agreement that is incompatible with this Addendum or with applicable requirements of the GDPR shall be deemed null and void. The provisions of this Addendum shall replace Section 13 of the Agreement and supersede any other conflicting provisions of the Agreement. 

1.2 Part A applies in situations where we act as a processor for you and Part B applies in situations where we act as a controller, in each case, in relation to Personal Data that is exchanged between the parties concerning Customers and other data subjects. 
1.3 Capitalised terms not defined in the Agreement that are used in this Addendum shall have the meaning set out in Part C. 



Part A: Our obligations as a processor



2. Our obligations as processor 

2.1 We will act only on documented instructions from you (including in respect of any transfers of Personal Data outside the EU/EEA) unless the instructions require material changes to the Agreement. 

2.2 We shall ensure that all persons authorised to process Personal Data on your behalf in relation to the Services have committed themselves to confidentiality in respect of the data. 

2.3 We shall assist you, as far as is possible, in fulfilling your obligation to respond to the requests of data subjects seeking to exercise their rights under the GDPR, in so far as they relate to the provision of the Services. 

2.4 To ensure the security of the Personal Data that we process on your behalf, and to safeguard the rights of data subjects, we have put in place and will maintain technical and organisational measures appropriate to the risks associated with the Services. 

2.5 On receiving a written request, we shall assist you in meeting your GDPR obligations in relation to the following:

(a) the security of the processing of Personal Data in relation to the Services; 

(b) the notification of Personal Data breaches where required; and 

(c) the conduct of data protection impact assessments, where necessary. 

2.6 Upon termination of the Agreement and your request, we shall either delete or return all Personal Data to you, unless we are legally obliged to keep such data. 

2.7 Upon request, we shall provide you with information necessary to demonstrate our compliance with the obligations set out in this Section 2, and shall allow for and contribute to audits, including inspections, conducted by you in relation to the processing activities connected to the provision of the Services. Your right to audit will be limited to once in any twelve-month period, and limited in time to a maximum of two (2) business days and scope, 

as reasonably agreed in advance between the parties. Reasonable advance notice of at least sixty (60) days is required, unless a Data Protection Law requires earlier audit. We will use current certifications or other audit reports to minimise unnecessary and repetitive audits. The parties will each bear their own expenses of audit, unless such audit reveals a breach by us (as independently verified by us), in which case we shall bear our own expenses of audit. If an audit determines that we have breached our obligations under the Agreement, we will promptly remedy the breach at our own cost. 


2.7 We will promptly inform you if we become aware of any suspected or confirmed Personal Data Breach involving Customer Personal Data. 

2.8 We shall immediately inform you if an instruction relating to Section 2.7 would, in our sole discretion, infringe the GDPR or other Data Protection Laws of the EU or an EU Member State having jurisdiction over the Agreement. 

2.9 We shall not engage any subprocessors to assist in providing the Services, unless we have :

(a) entered into a written contract with the subprocessor that obligates the subprocessor to comply with all relevant obligations applicable to us under this Section 2; and 

(b) obtained prior written authorisation from you. 

2.10 A list of our existing subprocessors, their roles, and the location of the processing carried out by them is set out in the Schedule to this Addendum. By entering into this Addendum, you agree that we may use these subprocessors for the purposes of providing the Services. 

2.11 We will notify you in advance of any changes to the list of subprocessors. 

2.12 Subprocessors will have the same obligations as we do as a processor (or subprocessor) with regards to their processing of Personal Data. 



Part B: Obligations of the parties when we act as a data controller in relation to you


3. Compliance with the GDPR 


3.1 The parties acknowledge that each is an independent controller of the Personal Data that it collects and processes in relation to activities that are necessary for carrying out the contractual relationship between them. This Personal Data includes, for example, the business contact data of each party’s employees and other stakeholders exchanged for the purposes of entering into the Agreement, sending promotional material and managing the business relationship. 

3.2 Our Privacy Notice can be found at securetrading.com 



4. Mutual Cooperation 


4.1 The parties shall cooperate with one another, upon reasonable request, in relation to compliance with the provisions of the GDPR relating to the provision of the Services, including with regard to responses to data subject requests for the exercise of their rights under the GDPR and any information requests, investigations, complaints or other actions of a national data protection supervisory authority. 

4.2 Where each party is acting as a controller, each party shall notify the other of any incident that involves a Personal Data Breach that relates to the provision of the Services without undue delay. The notification should describe the incident, the type of Personal Data involved, the identity of any affected persons or the approximate number of individuals affected, the potential consequences of a breach, and any immediate mitigation steps required or in progress. 


Part C: Definitions 

(a) “Data Protection Law(s)” shall mean the Data Protection Act 1998 (the “DPA”), the Data Protection Directive (95/46/EC), the Electronic Communications Data Protection Directive (2002/58/EC), the Privacy and Electronic Communications (EC Directive) Regulations 2003 (SI 2426/2003) (as amended), the General Data Protection Regulation (2016/679) and all applicable laws and regulations relating to Personal Data and privacy which are enacted from time to time in any relevant jurisdiction, including (where applicable) the guidance and codes of practice issued by the Information Commissioner’s Office and any other competent authority, and the equivalent of any of the foregoing in any relevant jurisdiction. Where the term Laws in used in the Agreement, it shall be construed to include the Data Protection Laws. 

(b) “GDPR” means Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 as applied, modified, added to, limited, widened, substituted, replaced or repealed by UK law or regulation (and references to any Article or provision of the Regulation shall be interpreted accordingly). 

(c) “Personal Data” shall mean any information relating to an identified or identifiable individual; an identifiable individual is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity (including special categories of Personal Data listed in Article 9(1) of GDPR). 

(d) “Personal Data Breach” shall mean accidental, unauthorised, or unlawful destruction, loss, alteration, or disclosure of, or access to, Personal Data. 
4.3 The terms "controller", "processor", "data subject" and "processing" shall have the meanings given to such terms in the GDPR, except where and to the extent that the context requires otherwise. 


5. Liability 

5.1 Subject to clause 6 of the Agreement, we shall only be liable for damage caused by processing where we have not complied with our obligations under Clause 2 of this Addendum or where we have acted outside or contrary to lawful and agreed instructions from you.



SCHEDULE TO ADDENDUM

This list identifies the subprocessors authorised to access Personal Data used by our systems. 
Sub processors are permitted to process Personal Data to deliver the services we have retained them to provide. They are prohibited from using Personal Data for any other purpose.

 

Subcontractor Location Function(s) Performed 
ACI United Kingdom / United States of America Cardholder Fraud Monitoring
Allied Irish Bank Ireland Transaction Processing and Settlement
Alipay China Transaction Processing and Settlement
Amazon Ireland / United Kingdom  Operations and Service Maintenance
American Express United Kingdom Transaction Processing and Settlement
Australia and New Zealand Banking Australia Transaction Processing and Settlement
Apple Inc United States of America Transaction Processing and Settlement
Atlassian United States of America / Ireland Operations and Service Maintenance
ATOS United Kingdom Transaction Processing and Settlement
Barclays United Kingdom Transaction Processing and Settlement
Catella Luxembourg Transaction Processing and Settlement
Chase Bank United States of America Transaction Processing and Settlement
Cloudflare United States of America Content Delivery Network
Compass United States of America Transaction Processing and Settlement
Currency Select United States of America Exchange Rate Processing
Datawire Australia Transaction Processing
Elavon United States of America Transaction Processing and Settlement
Finastra Ireland Operations and Service Maintenance
First Data United Kingdom Transaction Processing and Settlement
Fexco United Kingdom Exchange Rate Processing
Funanga Ireland Transaction Processing and Settlement
G4S Germany Operations and Service Maintenance
HSBC United Kingdom Transaction Processing and Settlement
JetPay United States of America Transaction Processing and Settlement
Omnipay Ireland Transaction Processing and Settlement
PPro United Kingdom Transaction Processing and Settlement
Mastercard United Kingdom / United States of America / Europe Cardholder Fraud Monitoring Transaction Processing
Microsoft United States of America / Ireland Operations and Service Maintenance
Millennium Digital United States of America Transaction Processing and Settlement
PayPal United States of America Transaction Processing and Settlement
Paysafe Germany Transaction Processing and Settlement
Salesforce United States of America Operations and Service Maintenance Customer and Technical Support
Streamline United Kingdom Transaction Processing and Settlement
The Access Group United Kingdom Operations and Service Maintenance
Vantiv United States of America Transaction Processing and Settlement
Visa Europe / United States of America Transaction Processing

 

 

Notice and Disclaimer
This Schedule is subject to change at any time. Last updated: 24th May 2018

 

หน้าที่ 1 จาก 5