Fraud Prevention Guidelines
Protect your business from fraudulent orders and payment schemes
Fraud Prevention Guidelines
Fraud prevention is critical for maintaining a profitable and sustainable vendor business on Purzle. This guide helps you identify, prevent, and respond to various types of fraud that can affect e-commerce vendors in Nigeria.
Understanding E-commerce Fraud
Types of Fraud Affecting Vendors
- Payment Fraud: Using stolen credit cards or fake payment methods
- Chargeback Fraud: Legitimate purchases disputed as unauthorized
- Account Takeover: Criminals accessing customer accounts
- Refund Fraud: Claiming refunds for unreturned items
- Triangulation Fraud: Using stolen cards to purchase from you, then reselling
The Cost of Fraud
- Direct Financial Loss: Lost merchandise and revenue
- Chargeback Fees: Additional penalties from payment processors
- Reputation Damage: Poor reviews from fraud victims
- Time Investment: Hours spent investigating and resolving issues
- Account Restrictions: Potential suspension for high fraud rates
Identifying Fraudulent Orders
Red Flag Indicators
- Unusually large orders from new customers
- Multiple orders in rapid succession
- Expensive items with rush shipping requests
- Mismatched information (billing vs. shipping addresses)
- Generic email addresses (temporary email services)
- Refuses to provide additional verification
- Pressure for immediate shipping
- Requests specific shipping/courier services
- Multiple failed payment attempts
- Unusual communication patterns or language
Geographic Risk Factors
- International orders to non-established addresses
- Freight forwarding services
- Countries with high fraud rates
- Addresses in known fraud hotspots
- Remote or unusual delivery locations
1. Call the customer to verify order details
2. Request additional ID verification
3. Confirm billing address with bank
4. Use delivery confirmation services
5. Hold shipment until payment fully clears
Payment Security Measures
Secure Payment Processing
- Payment gateway security with encryption
- Fraud detection algorithms monitoring transactions
- Address verification systems
- CVV verification for card payments
- Risk scoring for all transactions
Additional Verification Steps
- Require signed delivery for high-value items
- Photo ID verification for expensive orders
- Phone number verification before processing
- Address confirmation with utility bills
- Bank verification for large transactions
Payment Method Risk Assessment
- Bank transfers: Direct Nigerian bank transfers
- Established digital wallets: Verified accounts
- Corporate accounts: Business payment methods
- Repeat customers: Customers with purchase history
- New credit cards: First-time card usage
- Prepaid cards: Often associated with fraud
- International cards: Higher dispute rates
- Gift cards: Popular with fraudsters
Customer Verification Process
Identity Verification Steps
1. Email verification: Confirm active email address
2. Phone verification: Call to confirm contact details
3. Address verification: Cross-check with billing information
4. Social media check: Verify customer's online presence
5. Previous order history: Review customer's buying patterns
1. Government ID: Request driver's license or national ID
2. Utility bill: Confirm address with recent bill
3. Bank statement: Verify billing address
4. Video call: Face-to-face verification for expensive items
5. Reference contacts: Secondary contact person
Verification Documentation
- National Identity Card (NIN)
- Driver's License
- International Passport
- Voter Registration Card
- Student ID (for educational institutions)
- Utility bills (electricity, water, gas)
- Bank statements
- Government correspondence
- Lease agreements
- Insurance documents
Order Fulfillment Security
Secure Packaging and Shipping
- Tamper-evident packaging: Seals that show if opened
- Non-descriptive packaging: Don't advertise contents
- Insurance coverage: Insure high-value items
- Tracking services: Require signature confirmation
- Photo documentation: Pictures of packaged items
Delivery Security
- Signature required: Adult signature for expensive items
- ID verification: Delivery person checks recipient ID
- Delivery to person only: No unattended deliveries
- Delivery windows: Specific time slots for high-value items
- Alternative locations: Pick-up points for security
High-Value Item Protocols
- Video recording: Package preparation and sealing
- Serial number recording: Document unique identifiers
- Multiple photos: Item condition before packaging
- Secure courier services: Premium delivery partners
- Real-time tracking: Constant location monitoring
Chargeback Prevention
Understanding Chargebacks
Chargebacks occur when customers dispute transactions with their bank, potentially resulting in:
- Reversed payment and lost merchandise
- Chargeback fees (typically ₦5,000-15,000)
- Increased processing fees for future transactions
- Account restrictions if chargeback rates are high
Chargeback Prevention Strategies
- Detailed product descriptions: Accurate representations
- Clear return policies: Easy-to-understand terms
- Proactive customer service: Address issues quickly
- Order confirmations: Detailed email confirmations
- Shipping notifications: Keep customers informed
- Keep all records: Orders, communications, shipping
- Photo evidence: Item condition and packaging
- Delivery confirmations: Proof of successful delivery
- Customer communications: All email and message exchanges
- Return documentation: If items are returned
Responding to Chargeback Disputes
1. Immediate notification: Respond within required timeframe
2. Gather evidence: Compile all relevant documentation
3. Submit dispute: Provide compelling evidence package
4. Follow up: Monitor dispute status and respond promptly
5. Learn and improve: Analyze causes and prevent future chargebacks
Refund and Return Fraud Prevention
Common Refund Fraud Schemes
- Empty box returns: Returning boxes without items
- Item switching: Returning different/damaged items
- Wardrobing: Using items then returning them
- Multiple accounts: Using various accounts for same fraud
- Fake damage claims: False claims of damaged goods
Return Policy Security
- Return authorization: Require approval before accepting returns
- Original packaging: Items must be in original condition
- Photo documentation: Pictures of returned items
- Serial number verification: Check against original records
- Inspection process: Thorough examination before refund
Refund Processing Security
- Original payment method: Refund to original source
- Verification required: Confirm customer identity
- Processing delays: Allow time for verification
- Partial refunds: For items not in original condition
- Store credit options: Alternative to cash refunds
Technology and Fraud Detection
Automated Fraud Detection
- Risk scoring algorithms: Automatic order risk assessment
- Velocity checking: Multiple orders from same source
- Geolocation tracking: IP address and shipping address matching
- Device fingerprinting: Identify suspicious devices
- Behavioral analysis: Unusual shopping patterns
Third-Party Security Services
- Address verification services: Confirm billing addresses
- Phone verification services: Validate customer phone numbers
- Identity verification platforms: Enhanced customer screening
- Fraud monitoring services: Real-time transaction monitoring
- Credit checking services: Verify customer creditworthiness
Creating a Fraud Prevention Policy
Policy Components
1. Risk assessment criteria: Define high-risk orders
2. Verification procedures: Steps for customer verification
3. Order processing protocols: Security measures for fulfillment
4. Employee training requirements: Staff education on fraud
5. Incident response procedures: Steps when fraud is detected
Staff Training Requirements
- Fraud recognition: Identifying suspicious orders
- Verification procedures: Proper customer verification
- Documentation requirements: Record keeping standards
- Escalation procedures: When to involve management
- Legal considerations: Compliance with regulations
Legal Considerations and Compliance
Nigerian Fraud Laws
- Cybercrime (Prohibition, Prevention, etc.) Act 2015: Primary legislation
- Economic and Financial Crimes Commission (EFCC): Enforcement agency
- Nigerian Communications Commission (NCC): Telecommunications fraud
- Central Bank of Nigeria (CBN): Payment system fraud regulations
Reporting Fraud
- Suspected criminal activity: Evidence of intentional fraud
- Large financial losses: Significant monetary impact
- Repeat offenders: Multiple fraud attempts from same source
- Identity theft: Customer identity information stolen
- Organized crime: Evidence of coordinated fraud schemes
- EFCC: Economic and Financial Crimes Commission
- Nigerian Police: Local law enforcement cybercrime units
- Purzle Security: Platform security team
- Banks: Payment processor fraud departments
Building Customer Trust
Trust-Building Strategies
- Professional presentation: High-quality product images and descriptions
- Customer reviews: Encourage and display positive feedback
- Security badges: Display security certifications
- Contact information: Provide multiple contact methods
- About us page: Share your business story and credentials
Transparent Communication
- Detailed policies: Easy-to-understand terms and conditions
- Processing timelines: Realistic delivery expectations
- Security measures: Inform customers about protection measures
- Response times: Quick responses to customer inquiries
- Issue resolution: Fair and prompt problem resolution
Measuring Fraud Prevention Success
Key Performance Indicators
- Fraud detection rate: Percentage of fraud prevented
- False positive rate: Legitimate orders flagged as fraud
- Chargeback rate: Percentage of transactions disputed
- Investigation time: Time spent on fraud verification
- Customer satisfaction: Impact on legitimate customers
Regular Review Process
- Fraud attempt patterns: Identify common fraud characteristics
- Prevention effectiveness: Measure security measure success
- Cost-benefit analysis: Balance security costs with fraud losses
- Process improvements: Refine fraud prevention procedures
- Training needs: Identify staff education requirements
Emergency Response Procedures
Immediate Actions for Suspected Fraud
1. Stop fulfillment: Halt processing of suspicious orders
2. Document everything: Record all suspicious indicators
3. Contact customer: Attempt to verify order legitimacy
4. Notify management: Inform supervisors of potential fraud
5. Report to Purzle: Alert platform security team
Follow-Up Actions
1. Complete investigation: Gather all relevant evidence
2. Make final determination: Decide if order is fraudulent
3. Take appropriate action: Process or cancel order
4. Update records: Document decision and reasoning
5. Learn from incident: Identify prevention improvements
---
Effective fraud prevention requires vigilance, proper procedures, and continuous improvement. Implement these guidelines to protect your business while maintaining excellent customer service for legitimate buyers.