Tag: payment
CurrentC customer relations
Karen Webster wrote on PYMNTS about the scariest things in payments. Customers, furious at not being able to use the payment method of choice to shop at Rite Aid, are taking to Twitter to not only let their feelings be known, but letting Rite Aid know that they are now, literally, walking across the street…
MCX doublespeak
Kevin Fitchard wrote on Gigaom about the surreal interview given by MCX CEO Dekkers Davidson. He said no MCX member would be fined or penalized for accepting Apple Pay (contrary to an earlier report in the New York Times), while reiterating that member merchants have all agreed to use CurrentC exclusively. So are the members…
Why Apple Pay has little to fear from retailers
Dan Frommer wrote on Quartz about why Apple Pay has little to fear from retailers. How CurrentC works: Because it’s designed to skirt the existing credit-card infrastructure, CurrentC’s current version only supports payments via checking accounts and certain store cards. And it comes with a questionable privacy requirement: To “confirm your identity,” CurrentC demands both…
CurrentC and antitrust implications
Dave Mark wrote on Loop Insight about CurrentC and antitrust implications. Quoting from Reuters: Antitrust experts said CVS and Rite Aid have the right to drop a vendor if they believe they can save money by going around the credit card companies and Apple, both of which will take a piece of the action. But…
The real reason PayPal isn’t an Apple Pay preferred partner
Bank Innovation reported on why PayPal isn’t an Apple Pay preferred partner. But while these talks were going on, PayPal went ahead and partnered with Samsung on the Galaxy S5 fingerprint scanner, a move that was reportedly forced onto PayPal by eBay CEO John Donahoe. PayPal’s now-former president David Marcus was purportedly categorically against the…
Apple Pay: an in-depth look
TUAW wrote about Apple Pay. Remember that merchants in an Apple Pay transaction never have access to user credit card information and, as a result, users never have to worry about their information being compromised in a security breach. Further, security at the device level is effectively impenetrable as tokens, along with the encrypted keys…