A&B MONEY โอนเงินกลับไทย ส่งเงินด่วนรับเงินในวันเดียว ปลอดภัย ราคาถูก
Remote monitoring
and
Management IT Resources
Manage the several Computers in organization can be hard work and really need a lot of time to make sure any IT asset have firmware and software up to date. Remote monitoring and management IT Resources Tool will be the one point of control that improve security and reduce risk in the organization in several way:
Reliability and Productivity To make all the IT assets managed and maintained from one point in real time for ensure all uptime and performance. Reduce the IT support time and associated cost.
Reduce Risk To detect and repair problems which is reduce overall downtime and security risk.
Enhance IT Security To make sure all the IT assets have regular updates on operation systems and have all vulnerabilities patched.
All of officer’s computer will be install the client software of Remote monitor and management tool. The software will monitor all the machine and network usage activity to the main Account that hold by authorized person and regular update patch to the system. Authorized persons have ability to control and remote to client computer for purpose of solve the technical issues.
Remote monitoring and Management Use
All the computer in the organization will be monitor on the system, performance, resources and process, uptime logged in user and network usage in real-time. Management software will be installed on authorized control person’s smartphone to help and control from anywhere any time. Any critical IT system issue will be alert directly to authorized control person.
Support automate task under the policy IT resources usage such as automate backup specific folder or automate notification to authorized control person when system triggered.
Routine make as twice a week to check and install update to operation system and software. Vulnerabilities patch update and antivirus scan task run as daily. Authorized person can take control the update process or start the process instantly.
Authorized control person can remote to client computer to control or operate under the purpose of work or solve the technical issues. Chat and file sharing feature support work remote. Authorized control person allows to control and command such as Restart the machine or Shutdown the computer by use the main software or App.
Report summary usage of all IT assets in organization to know the overall and detail that help the organization to plan and mange the resources the report will be cover as list
Summary monitor and resource report.
Any issue or critical error report in the last 30 days.
Patch and update log and track.
Network usage report.
Mobile Application Security
Payment Services Directive 2 is the new regulatory standards requires to payment service providers to follow and integrated for secure and efficient payment process. A&B Money have Apps service provided to our customer under Google Play and Apple App Store which is affect directly by PSD2 under Subject of Common and Secure Communication (CSC).
To follow the PSD2 Compliance, A&B Money must update the Mobile Apps security to support the requirement of PSD2. The main thing of PSD2 is to protect consumers and to make the use of payment services safer. To meet these requirements, A&B Money should add security capabilities to the mobile apps for protect against known and unknown treats on users’ devices. At the same time, mobile banking apps should be able to detect when they are installed on risky devices and block access until those risks have been remediated.
Security Implement must have in any apps of A&B Money
Mobile devices with access to the operating system are not permitted. (rooted / jailbroken) Access the app. To reduce the risk that malicious people can access the information of importance of service users and violate or avoid security measures provided by the service provider.
Mobile devices running obsolete operating systems are not allowed. There are serious vulnerabilities announced by the international security agency. And affect the use of a broader user access to the application in case of obsolete OS There are other vulnerabilities that do not affect the broader user. There should be measures to mitigate the risk of the service provider. And service users as appropriate, such as notification of service users, limiting transaction limits and increasing Identity verification measures
requesting access to resources or services by the application (application permission) on the user's mobile device as needed and there is a review process for permission. This is done regularly to prevent violations of the privacy rights of the users.
Prevent important source codes such as money transfers, authentication, from Leaked from the application to reduce the risk that the malicious person modifies the source code.
Prevent the implantation of sensitive information or malicious code. On the application
Files encryption that is stored for Important information on mobile devices of users to protect information Significant loss of customers.
Users are not allowed to use lower versions of the application. More than that specified by the service Provider To provide the application with a security that meets the standards of the service provider.
Prevent Distributed denial-of-service (DDoS Attack) attacks. At the network layer (network layer) to protect the system from attacks and cannot provide services.
Prevent threats from being intercepted or altered during transmission. (Man, in the Middle Attack) by confirming identity by Certificate Pinning technique or equivalent method, enforcing TLS version, use of secure communication channels (secure protocol) to transmit data.
Prevent the identity of customers (Session Hijacking) and keylogger in mobile apps.
Prevent unauthorized access to the host computer (server). Such as SQL Injection, Local File Inclusion or Directory Traversal. To reduce the risk of information leaks and system attacks.
This issue occurs in some mobile devices that have Android platform installed. Screen Overlay is a special permission granted to Android apps, with the help of which, apps can appear on top of another app screen. Nowadays, almost every app is using this permission to enhance its user experience.
A&B Money takes privacy too seriously and how we handle personally identifiable information (PII) to protect your personal information accessed through A&B Money App. We block the operation of A&B Money App on devices that Root and jailbreak.
Memory corruption bugs are a popular mainstay with hackers. This class of bug results from a programming error that causes the program to access an unintended memory location. Under the right conditions, attackers can capitalize on this behavior to hijack the execution flow of the vulnerable program and execute.
Secure Storage + Device Binding
Secure storage can be used to store sensitive information such as passwords, keys, certificates, etc. All the information in the secure storage is in encrypted format. And only access to your own secure storage
Identifying possible entry points for untrusted input then tracing from those locations to see if the destination contains potentially vulnerable functions. Identifying known, dangerous library / API calls (e.g., SQL queries) and then checking whether unchecked input successfully interfaces with respective queries.
Detect that your application is deployed in a compromised environment and take preventive actions (e.g., terminate the application). Disallow the use of non-standard/non-official keyboards from within your application.
The screen magnifier, braille output device, on-screen keyboard should be detected, voice recognition, etc.
Debugger & VM Debuggers Prevention
Anti-debugging is an anti-analysis technique that is used by malware to check if it is being debugged. Malware authors use many techniques to prevent and or slow the reverse engineer from debugging their code.
Runtime Protection – Integrity Check
They can protect themselves from runtime analyzes and live attacks. Mechanisms monitor the health of applications and the environment in which they are running in real time. When a threat is detected, the application will respond in a pre-programmed manner. Possible reactions range from showing security alerts to terminating user sessions and applications, in addition to helping secure communication between the mobile application and the server.
To prevent protected applications from running within the emulator. (Simulated Environment) To prevent mobile apps from running on emulators, an effective emulator must be detected first.
Renaming functions, methods, classes to use less descriptive names. Additional techniques include deleting debugging information such as type, source file parameter and line number, as well as deleting annotations.
It actively detects malicious key logging, screen readers, repackaged applications, debuggers, and emulators, and jailbroken or rooted devices. It can then react to prevent screenshots, block screen duplication, or enable customized actions based on business policy (i.e. Application shut down).
IT Security Awareness for Customers
Awareness and Knowledge for Online Banking Services:
Cybercriminal attacks on individuals most of the time so it is important to be aware of the threats and to approach anything on the internet that involves customer identity or account numbers with caution. Cyber criminals have several ways to steal identity such as creating fake websites that mimic legitimate sites such as PayPal or Some Banking Website to steal confidential information.
In some case, theft and fraud is committed by family members and friends or acquaintances of victims who, because of these relationships, have relatively easy access to account numbers and passwords saved on computers.
Security Practices list
Verify use of a secure session (https:// and not http://) when entering passwords on the internet.
Pay attention to the URL (web address) that you are visiting! Fraudulent websites often create misleading web address like https://www.somecompany.AnotherWebsite.com/ to trick users of a https://www.somecompany.com/ into believing they are visiting a legitimate site where they have an account when they are really at a password harvesting spoof of the legitimate website. This is a quite common trick that scammers use to fool users for steal passwords by fake copies of real websites
No website or service will ever lose a user’s login information and request that the user provide it to the website or company. Requests involving this sort of statement are always a scam and usually involve some sort of coercive statement such as threatening the loss of funds if login credentials are not supplied in time.
Avoid saving passwords to any computer.
Always use Log Out buttons when you are finished to end your secure sessions. This helps prevent session hijacking attacks where hackers keep sessions open when you think they have been closed.
Never leave computers unattended when using online banking services.
Never access sensitive computer systems or websites from public computers at a hotel, library, coffee shop or when using your own devices over any public wireless access point.
Offers for employment as a mystery shopper, payment processor, etc. where you are required to use your personal account for someone else’s business purposes are never legitimate.
No legitimate business will attempt to move business funds through anyone’s personal account.
Password Security:
It is difficult to the system to check that user who have the correct password is the truly account holder so it mostly important that customer must keep their passwords private and immediately report any suspected security violations. Below is a list of some common password choices and bad behavior to avoid:
Your name, or a family member or pet’s name
Social Security, account, or telephone numbers
Solitary word in any language. Hackers have dictionary-based systems to crack these types of passwords
Any part of your physical address
Anybody’s birth date
Other information that is easily obtained about the user
A word in the English or any foreign dictionary, even spelled backwards
A password used on another site
Sequences: “12345678”, or “33333333”, “abcdefgh”
Write your passwords down, share them with anyone or let anyone see you log into devices or websites.
Answer "yes" when prompted to save your password to a particular computer's browser.
The password choices and good behavior to do:
Use a combination of uppercase and lowercase letters, symbols, and numbers.
Make sure your user passwords are at least eight characters long. The more characters and symbols your passwords contain, the more difficult they are to guess.
Change your passwords regularly.
Log out of websites and devices when you are finished using them.
Aware of Cyber threats:
If customer know what kind of cyber threats they might face these days, then they can avoid and protect themselves better. The list of threats and how to handle show as below
Common spam email security threats:
Spam emails are annoying enough, but some of them can put your digital safety at risk. Some spam messages contain viruses, malware, and other cyberthreats. Here are a few to watch for.
Trojan horses
Trojan horses come disguised as a legitimate program. Even if the customer think they know how to verify whether an email is legitimate, a trojan horse uses deception to get past those defense mechanisms.
For instance, It can hide inside free software downloads or arrive as an email attachment, possibly from someone you know.
When open the email, the trojan installs malicious code — typically spyware or viruses — designed to create problems on their computer.
It may allow an attacker to control the computer, lock you out, steal the data, account information or email addresses. Installing anti-malware software may help you catch these trojans.
To help avoid trojan horses, avoid clicking on pop-up messages on the computer. If you are seeing a lot of pop-ups, consider running an antivirus scan.
Zombies
Zombies are a type of malware that also comes in email attachments. They turn the computer into a server and sends spam to other computers. Customer may not know that their computer is compromised, but it may slow down considerably, or the battery may drain quickly. Meanwhile, the computer may be sending out waves of spam or attacking web pages.
One way to avoid zombies is to avoid opening attachments or clicking links in emails from the spam folder.
Lottery scams and fake offers
Sometimes, cyber thieves use old-school scams that might seem legitimate but are fake offers. These play on customer desires or good nature: You've won a lot of money or someone urgently needs your help.
The customer has not won a lottery or a cruise around the world. And they have not been selected by a foreign prince to receive $10 million, in exchange for the use of their bank account number. Look for phrases of urgency like, “Immediate,” and “Act Now” in the email’s title to avoid lottery scams and fake offers. Refer to the Delete Emails section of this post for additional characteristics to look for.
How to stay spam free:
So far, there is no such thing as a "do not email" list for spam. Until there is, Customer will have to take care of spam themselves.
Fortunately, there are good tools to help you do that. Most email programs include spam filters that can help detect and isolate spam. Many internet service providers filter out spam, so it never reaches your computer. But it is wise to install and run anti-virus security software that can eliminate viruses that may already live on the computer.
Spam emails, otherwise known as junk mail, are uninvited bulk-sent email messages delivered to an inbox. You probably receive email spam and marketing messages regularly. But there is one difference between a spam message and marketing message: permission.
Spam messages often come from illegitimate email addresses and may contain explicit or illegal content. These emails often use scare tactics, contain typos and misleading information, and are sent in bulk from an anonymous sender. They seldom contain an unsubscribe link, and if it does, that link may be embedded with malware. This could lead to cybercriminals gaining access to your computer, smartphone, and other devices.
There are ways to help slow the tide of unwanted emails. So, here are the few simple ways you can take to help eliminate spam emails.
1. Mark as spam
Most email services, such as Gmail, Yahoo Mail, Microsoft Outlook, and Apple Mail have algorithms that filter out spam and junk mail by tucking them away in a folder.
But if customer find a spam email in their regular inbox, don't delete the message — mark it as spam. Marking a suspicious email as spam will send it to the spam folder. Moving forward, if you receive any more emails from this address, the spam filter will know no to let it into your inbox.
2. Delete spam emails
There is a golden rule to dealing with spam emails: if it looks like a spam message, it probably is — so delete it without clicking or downloading anything. If the message in question appears to come from someone you know, contact them outside of your email.
3. Keep your email address private
Giving out your email address can increase the amount of spam email you receive. So, if it’s not essential to share, keep it private. Also, consider changing your email privacy settings.
4. Unsubscribe from email lists
Unsubscribing from email lists is an ideal way to keep out from spam email. Marketers often get the customer email address from online forms, social media, and scraping tools, and purchase customer information from other companies. So, the less they subscribe to, the less these marketers and spammers can find your address.
Common Phishing threats:
Phishing is a cybercrime in which scammers try to lure sensitive information or data from you, by disguising themselves as a trustworthy source. Phishers use multiple platforms.
How does phishing work?
The phisher begins by determining who their targeted victims will be (whether at an organization or individual level) and creates strategies to collect data they can use to attack.
Next, the phisher will create methods like fake emails or phony web pages to send messagesthat lure data from their victims.
Phishers then send messages that appear trustworthyto the victims and begin the attack.
Once the attack has been deployed, phishers will monitor and collect the datathat victims provide on the fake web pages.
Finally, phishers use the collected data to make illegal purchases or commit fraudulent acts.
Types of phishing attacks
1. Email Phishing
The basic phishing email is sent by fraudsters impersonating legitimate companies, often banks or credit card providers. These emails are designed to trick you into providing log-in information or financial information, such as credit card numbers or Social Security numbers.
Other spoof emails might try to trick the customer into clicking a link that leads to a fake website designed to look like Amazon, eBay, or bank. These fake websites can then install malware or other viruses directly onto the computer, allowing hackers to steal personal information or take control of the computer, tablet, or smartphone.
How to recognize phishing emails
Scammers have become more sophisticated when it comes to sending out phishing emails. But there are still some signs the customer can look for:
Too good to be true offers.Phishing emails may try to hook you with what appears to be incredibly cheap offers for things like smartphones or vacations. The offers may look irresistible but resist them. They are likely phishing emails.
A bank — maybe not even your own — is asking for your account information or other personal financial information.Your bank, or any financial institution, will never ask for your Social Security number, bank account number, or PIN by email. Never provide this information in response to an email.
Spelling and grammatical mistakes.There was a time when you could easily spot phishing emails because they were littered with spelling and grammar mistakes. Scammers have gotten better at avoiding these errors, but if you do receive an email littered with typos and weird language, that email might be sent from someone phishing.
The generic greeting.Phishing emails might not be addressed specifically to you. Instead, the email might start with a generic greeting such as “Dear Sir or Madam” or “Dear Account Holder.”
A call for immediate action.Phishers want you to act quickly, without thinking. That is why many will send emails asking you to immediately click on a link or send account information to avoid having your bank account or credit card suspended. Never reply hastily to an emergency request. Urgent requests for action are often phishing scams.
Senders you do not recognize.If you do not recognize the sender of an email, consider deleting it. If you do decide to read it, be careful not to click on links or download files.
Senders you think you recognize.You might get a phishing email from a name you recognize. But here is the catch: That email may have come from the compromised email account of someone you know. If the email requests personal information or money, it is likely it’s a phishing email.
If you receive an email that requests you click on an unknown hyperlink, hovering over the option might show you that the link is really taking you to a fake, misspelled domain. This link is created to look legitimate but is likely a phishing scam.
The sender included attachments that do not make sense or appear spammy.
2.Pop-up phishing
Pop-up phishing is a scam in which pop-up ads trick users into installing malware on their computers or convince them to purchase antivirus protection they do not need.
These pop-up ads sometimes use scare tactics. A common pop-up phishing example is when an ad might pop up on a user’s screen warning the user that their computer has been infected and the only way to remove the virus is by installing a particular type of antivirus software.
Once the user installs this software, it either does not work or, worse, does infect the computer with malware.
How can I protect myself from phishing attempts?
Though hackers are constantly coming up with new phishing techniques, there is good news. There are some things that customer can do to protect themselves and their organization. All it requires is some common sense.
Do not open suspicious emails.If customer receive an email supposedly from a financial institution with an alarming subject line — such as “Account suspended!” or “Funds on hold” — delete it. If the customer is worried that there is a problem, log in to the account or contact the bank directly. If there really is a problem with the bank account or credit card, they can find information once they have logged in.
Do not click on suspicious links in emails.If the customer does open an email from someone they do not know and instructed to click on a link, do not. Often, these links will take you to fake websites that will then encourage them to either provide personal information or to click on links that might install malware on your computer.
Do not send financial information through email.their bank or credit card provider will never ask them to provide bank account numbers, Social Security number, or passwords through email.
Do not click on pop-up ads.Hackers can add fraudulent messages that pop up when visit even legitimate websites. Often, the pop-ups will warn the customer that their computer is infected and instruct them to call a phone number or install antivirus protection. Avoid this temptation. Scammers use these ads to either install malware on the computer or scam out for payment for a computer clean-up they do not need.
Use spam filters.Spam filters can help block emails from illegitimate sources, but the customer should always use best judgment in case phishing emails get past your blocker.
Sign up for antivirus protection.Make sure the computer is protected by strong, multi-layered security software.
Installing and running trusted security software may provide real-time threat protection, help them create and manage unique passwords, and help protect personal files and financial information from phishing attacks and other scams.
How to recover after responding to a phishing email
Change your passwords:Make sure to change the passwords they use for their banking, credit card and other accounts. Use a combination of numbers, letters, and symbols to make these passwords more difficult to crack. Consider enabling multi-factor authentication if it is available. Multi-factor authentication requires entering a second piece of information — such as a code sent to your smartphone — to access an account.
Contact your credit card providers:If the customer has given up credit card information, immediately call the credit card providers. They can freeze the account credit to prevent unauthorized purchases. They can also work with customer to determine which purchases on the accounts are legitimate and which were made by criminals.
Check your credit reports:Order free copies of the customer credit reports from Credit Report provider. Check these reports carefully for any unfamiliar activity to make sure no one has opened credit card accounts or loans in the customer’s name.
Study your credit card statements:Be on the lookout for any unauthorized or suspicious charges.
A&B GENERAL LIMITED
DATA PROTECTION ADDENDUM RELATING TO THE PARTIES’ OBLIGATIONS UNDER THE
GENERAL DATA PROTECTION REGULATION EU 2016/679 (“GDPR”)
1. Scope and Applicability
1.1 This Data Protection Addendum (“Addendum”) supplements the Payment Gateway Terms and Conditions (“Agreement”) between the parties. Any provision of the Agreement that is incompatible with this Addendum or with applicable requirements of the GDPR shall be deemed null and void. The provisions of this Addendum shall replace Section 13 of the Agreement and supersede any other conflicting provisions of the Agreement.
1.2 Part A applies in situations where we act as a processor for you and Part B applies in situations where we act as a controller, in each case, in relation to Personal Data that is exchanged between the parties concerning Customers and other data subjects.
1.3 Capitalised terms not defined in the Agreement that are used in this Addendum shall have the meaning set out in Part C.
Part A: Our obligations as a processor
2. Our obligations as processor
2.1 We will act only on documented instructions from you (including in respect of any transfers of Personal Data outside the EU/EEA) unless the instructions require material changes to the Agreement.
2.2 We shall ensure that all persons authorised to process Personal Data on your behalf in relation to the Services have committed themselves to confidentiality in respect of the data.
2.3 We shall assist you, as far as is possible, in fulfilling your obligation to respond to the requests of data subjects seeking to exercise their rights under the GDPR, in so far as they relate to the provision of the Services.
2.4 To ensure the security of the Personal Data that we process on your behalf, and to safeguard the rights of data subjects, we have put in place and will maintain technical and organisational measures appropriate to the risks associated with the Services.
2.5 On receiving a written request, we shall assist you in meeting your GDPR obligations in relation to the following:
(a) the security of the processing of Personal Data in relation to the Services;
(b) the notification of Personal Data breaches where required; and
(c) the conduct of data protection impact assessments, where necessary.
2.6 Upon termination of the Agreement and your request, we shall either delete or return all Personal Data to you, unless we are legally obliged to keep such data.
2.7 Upon request, we shall provide you with information necessary to demonstrate our compliance with the obligations set out in this Section 2, and shall allow for and contribute to audits, including inspections, conducted by you in relation to the processing activities connected to the provision of the Services. Your right to audit will be limited to once in any twelve-month period, and limited in time to a maximum of two (2) business days and scope,
as reasonably agreed in advance between the parties. Reasonable advance notice of at least sixty (60) days is required, unless a Data Protection Law requires earlier audit. We will use current certifications or other audit reports to minimise unnecessary and repetitive audits. The parties will each bear their own expenses of audit, unless such audit reveals a breach by us (as independently verified by us), in which case we shall bear our own expenses of audit. If an audit determines that we have breached our obligations under the Agreement, we will promptly remedy the breach at our own cost.
2.7 We will promptly inform you if we become aware of any suspected or confirmed Personal Data Breach involving Customer Personal Data.
2.8 We shall immediately inform you if an instruction relating to Section 2.7 would, in our sole discretion, infringe the GDPR or other Data Protection Laws of the EU or an EU Member State having jurisdiction over the Agreement.
2.9 We shall not engage any subprocessors to assist in providing the Services, unless we have:
(a) entered into a written contract with the subprocessor that obligates the subprocessor to comply with all relevant obligations applicable to us under this Section 2; and
(b) obtained prior written authorisation from you.
2.10 A list of our existing subprocessors, their roles, and the location of the processing carried out by them is set out in the Schedule to this Addendum. By entering into this Addendum, you agree that we may use these subprocessors for the purposes of providing the Services.
2.11 We will notify you in advance of any changes to the list of subprocessors.
2.12 Subprocessors will have the same obligations as we do as a processor (or subprocessor) with regards to their processing of Personal Data.
Part B: Obligations of the parties when we act as a data controller in relation to you
3. Compliance with the GDPR
3.1 The parties acknowledge that each is an independent controller of the Personal Data that it collects and processes in relation to activities that are necessary for carrying out the contractual relationship between them. This Personal Data includes, for example, the business contact data of each party’s employees and other stakeholders exchanged for the purposes of entering into the Agreement, sending promotional material and managing the business relationship.
3.2 Our Privacy Notice can be found at securetrading.com
4. Mutual Cooperation
4.1 The parties shall cooperate with one another, upon reasonable request, in relation to compliance with the provisions of the GDPR relating to the provision of the Services, including with regard to responses to data subject requests for the exercise of their rights under the GDPR and any information requests, investigations, complaints or other actions of a national data protection supervisory authority.
4.2 Where each party is acting as a controller, each party shall notify the other of any incident that involves a Personal Data Breach that relates to the provision of the Services without undue delay. The notification should describe the incident, the type of Personal Data involved, the identity of any affected persons or the approximate number of individuals affected, the potential consequences of a breach, and any immediate mitigation steps required or in progress.
- 2 -
Part C: Definitions
(a) “Data Protection Law(s)” shall mean the Data Protection Act 1998 (the “DPA”), the Data Protection Directive (95/46/EC), the Electronic Communications Data Protection Directive (2002/58/EC), the Privacy and Electronic Communications (EC Directive) Regulations 2003 (SI 2426/2003) (as amended), the General Data Protection Regulation (2016/679) and all applicable laws and regulations relating to Personal Data and privacy which are enacted from time to time in any relevant jurisdiction, including (where applicable) the guidance and codes of practice issued by the Information Commissioner’s Office and any other competent authority, and the equivalent of any of the foregoing in any relevant jurisdiction. Where the term Laws in used in the Agreement, it shall be construed to include the Data Protection Laws.
(b) “GDPR” means Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 as applied, modified, added to, limited, widened, substituted, replaced or repealed by UK law or regulation (and references to any Article or provision of the Regulation shall be interpreted accordingly).
(c) “Personal Data” shall mean any information relating to an identified or identifiable individual; an identifiable individual is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity (including special categories of Personal Data listed in Article 9(1) of GDPR).
(d) “Personal Data Breach” shall mean accidental, unauthorised, or unlawful destruction, loss, alteration, or disclosure of, or access to, Personal Data.
4.3 The terms "controller", "processor", "data subject" and "processing" shall have the meanings given to such terms in the GDPR, except where and to the extent that the context requires otherwise.
5. Liability
5.1 Subject to clause 6 of the Agreement, we shall only be liable for damage caused by processing where we have not complied with our obligations under Clause 2 of this Addendum or where we have acted outside or contrary to lawful and agreed instructions from you.
SCHEDULE TO ADDENDUM
This list identifies the subprocessors authorised to access Personal Data used by our systems.
Sub processors are permitted to process Personal Data to deliver the services we have retained them to provide. They are prohibited from using Personal Data for any other purpose.
Subcontractor | Location | Function(s) Performed |
ACI | United Kingdom / United States of America | Cardholder Fraud Monitoring |
Allied Irish Bank | Ireland | Transaction Processing and Settlement |
Alipay | China | Transaction Processing and Settlement |
Amazon | Ireland / United Kingdom | Operations and Service Maintenance |
American Express | United Kingdom | Transaction Processing and Settlement |
Australia and New Zealand Banking | Australia | Transaction Processing and Settlement |
Apple Inc | United States of America | Transaction Processing and Settlement |
Atlassian | United States of America / Ireland | Operations and Service Maintenance |
ATOS | United Kingdom | Transaction Processing and Settlement |
Barclays | United Kingdom | Transaction Processing and Settlement |
Catella | Luxembourg | Transaction Processing and Settlement |
Chase Bank | United States of America | Transaction Processing and Settlement |
Cloudflare | United States of America | Content Delivery Network |
Compass | United States of America | Transaction Processing and Settlement |
Currency Select | United States of America | Exchange Rate Processing |
Datawire | Australia | Transaction Processing |
Elavon | United States of America | Transaction Processing and Settlement |
Finastra | Ireland | Operations and Service Maintenance |
First Data | United Kingdom | Transaction Processing and Settlement |
Fexco | United Kingdom | Exchange Rate Processing |
Funanga | Ireland | Transaction Processing and Settlement |
G4S | Germany | Operations and Service Maintenance |
HSBC | United Kingdom | Transaction Processing and Settlement |
JetPay | United States of America | Transaction Processing and Settlement |
Omnipay | Ireland | Transaction Processing and Settlement |
PPro | United Kingdom | Transaction Processing and Settlement |
Mastercard | United Kingdom / United States of America / Europe | Cardholder Fraud Monitoring Transaction Processing |
Microsoft | United States of America / Ireland | Operations and Service Maintenance |
Millennium Digital | United States of America | Transaction Processing and Settlement |
PayPal | United States of America | Transaction Processing and Settlement |
Paysafe | Germany | Transaction Processing and Settlement |
Salesforce | United States of America | Operations and Service Maintenance Customer and Technical Support |
Streamline | United Kingdom | Transaction Processing and Settlement |
The Access Group | United Kingdom | Operations and Service Maintenance |
Vantiv | United States of America | Transaction Processing and Settlement |
Visa | Europe / United States of America | Transaction Processing |
Notice and Disclaimer
This Schedule is subject to change at any time. Last updated: 24th May 2018
FRAMEWORK PAYMENT TERMS AND CONDITIONS
1. MONEY TRANSFER SERVICE
1.1 These terms and conditions govern the money transfer services provided to you by A&B General UK Limited., of M228, Trident Business Centre,89 Bickersteth Road, London SW17 9SH No. 6928080 (referred to as the “Firm”)
1.2 Our head office address is 163 Bellville House, 4 John Donne Way, London SE10 9FW, telephone number 02033559660 email This email address is being protected from spambots. You need JavaScript enabled to view it. [The address of the branch providing the money transfer service is Second Floor, Pepys House, 10 Greenwich Quay, Clarence Rd, London SE8 3EY, telephone number 02033559660, email This email address is being protected from spambots. You need JavaScript enabled to view it.]
1.3 We are regulated by the Financial Conduct Authority under the Payment Services Regulations 2017 (registration number no. 716949) for the provision of payment services.
1.4 For simplicity we will refer to ourselves and our branches and agents as "the Firm" or "we/our/us".
1.5 We operate a money transmission service which you will use to send and to receive money transfers. Our money transfers can be sent and picked up at most locations worldwide. You may call the number listed above or check our website at www.ab-money.co.uk/en (the "Website") for the address and business hours of nearby locations. The main characteristics of the payment services which we may provide to you are as follows:
• Retail money remittance service: a money transfer service for a sending customer where a remittance payment is made to a named receiving customer, normally in another country (money may be received in a bank account);
1.6 Money transfers will normally be paid out in a bank account. All payments are subject to availability, the payee showing documentary evidence of their identity and providing all details about the money transfer required by us as set out in these Terms and Conditions and including, without limitation, the name of the payer, country of origin, name of the payee, the payment amount, transaction control identification number and any other conditions or requirements which we consider necessary or applicable at the payee payment location. They may, in addition, be obtained by contacting us using the contact details set out in clause 1 of these Terms and Conditions or by checking our Website.
1.7 We are agreeing to provide you with a money transfer service. We do not accept any responsibility for any goods or services which may be paid for by a money transfer (or any taxes, charges or duties payable thereon). You are cautioned against sending money to any
person you do not know. You bear the risk of your intended payee failing to pick up the payment after it has been transferred to the correct destination.
2.2 Note that there may be no signature, security or password protection for email, phone, fax and other future forms of electronic communication. You should bear this in mind if you decide to permit us to accept those types of instruction. If we do decide to accept any type or types of electronic communication from you, we advise:
• against using analogue mobile or cordless phones to contact us as they can sometimes be intercepted or overheard;
• you to be careful not to let other people see your details if you are online in a public place; and
• against using email for sending us confidential information.
2.3 Where we agree to accept instructions in a particular format (including in electronic format), we will not be able to act on the instructions unless they are legible and clear.
2.4 We may decline to act on any communication, even if we have told you we will in general accept that type of instruction. We may do this in particular if we consider that there is doubt about the validity of the communication and it is in our or your interest to query it with you. However, we are not obliged to check or consider the validity of your communications unless we have previously agreed a system of validation with you. Subject to any legal or regulatory requirements which may apply, we are authorised to act upon any instruction, agreement or arrangement without enquiring about its purpose, or the circumstances in which it is given, or about the disposition of any proceeds.
2.5 If we come to believe that you may not have properly authorised a communication, we may, after making reasonable efforts to check whether it was authorised, refuse to act on the instruction and take steps to reverse any action already taken on it.
2.6 Without prejudice to clause 6 of these Terms and Conditions, we may act without further enquiry on any electronic communication which we reasonably believe you have given us
2.7 You must follow any security procedures we specify. We may also require you to sign a separate agreement before you can use some types of electronic communication to send us instructions and to access some kinds of services by electronic communication.
2.8 We may insist that you confirm any electronic communication in conventional written form by the next business day. We need not wait for confirmation before acting on the instruction. For the purposes of these Terms and Conditions, "business day" means any day on which we are open for business (other than a Saturday or Sunday or a public holiday) as required for the execution of a payment transaction.
2.9 We can communicate with you by telephone, email, text message, Line, Facebook fanpage, or any other form of electronic communication by which you have chosen to be able to give us instructions.
2.10 The language of these Terms and Conditions shall be English and Thai and all information provided, made available and notified to you shall be in English and Thai.
2.11 We will provide you with a further copy of these Terms and Conditions upon request.
2.12 After we receive a payment instruction from you as payer, we shall provide the following information in accordance with the provisions of clause 2.14:
• a reference enabling you to identify the payment transaction and, where appropriate, information relating to the payee;
• the amount of the payment transaction in the currency used for the payment instruction;
• the amount of the charges and transfer fees for the payment transaction payable by you (with a breakdown of such amounts where applicable);
• where applicable, the exchange rate used in the payment transaction by us and the amount of the payment transaction after that currency conversion; and
• the date of receipt by us of your payment instruction.
2.13 After the execution of a payment transaction, we shall provide , if you are the payee, the following information in accordance with the provisions of clause 2.14:
• a reference enabling you to identify the payment transaction and the payer, and any information transferred with the payment transaction;
• the amount of the payment transaction in the currency in which the funds are at your disposal;
• the amount of the charges and transfer fees for the payment transaction payable by you (with a breakdown of such amounts where applicable);
• where applicable, the exchange rate used in the payment transaction by us, and the amount of the payment transaction before that currency conversion; and
• the credit value date.
2.14 We will provide you with the information specified in clauses 2.12 and 2.13, free of charge, at least once a month. You will examine the confirmations and communications which we send to you within a reasonable time after receiving them and will promptly advise us without undue delay of any apparent mistake or discrepancy. Delay in notification may make correcting any error difficult.
2.15 If you prefer paperless communications with us, we may communicate and make available all relevant transaction information with you (including the information specified in clauses 2.12 and 2.13) through an internet money transmission service (if any) accessible via our Website. To access the internet money transmission service, you will need a computer with an internet connection as well as a working email address. Where you are the payer, we will always ask you to expressly agree to receiving information in this way.
2.16 If you require information on an individual payment transaction before sending us an instruction, please contact us using the contact details set out in clause 1 of these Terms and Conditions or via our Website.
2.17 We will contact you by telephone, email, text message, Line, Facebook fanpage or any other form of electronic communication by which you have chosen to be able to give us instructions. if there are suspected or actual fraud or security threats relating to the services we provide to you.
3.2 You must not give out security details, such as any password or PIN, to anyone and you must not write these down in any recognisable form. You must notify us without undue delay in writing or by telephone using the contact details set out in clause 1 of these Terms and Conditions or via our Website on becoming aware that someone else knows your
password, PIN or other security information or that any of these have been lost, stolen or misappropriated, and we will take immediate steps to try to prevent these from being used.
3.3 You agree to assist us in the discharge of our anti-money laundering, security validation and verification responsibilities by providing such information and evidence which we may request from time to time in this regard. You agree to notify us promptly of any changes in the details you have supplied to us. In addition, we may, in our sole discretion, require other documents to be supplied to us at any time during our relationship with you in order to fulfil our legal and regulatory obligations.
3.4 You represent and warrant that:
• you are over 18 years old
• the information and details you supply to us are true, accurate and complete
• your money transfer instructions to us and your use of your chosen form of payment instrument for payment to us will not breach any applicable agreement, law or regulation,
and you agree to compensate us for any loss we suffer as a result of the above representations being untrue or incorrect.
3.5 We may use information about you and your individual representatives to discharge the responsibilities referred to in clauses 3.3, 5.10, 5.13 and 5.14 to provide our services and to manage our relationship with you. We may disclose this information to payers, payees and intermediaries in the course of providing our services or as required by Regulation EC 2015/847 on information on the payer accompanying transfers of funds; persons with whom we share information for anti-money-laundering, security verification or validation purposes; regulatory and prosecuting authorities; service providers acting on our behalf.
This may involve transfer of information to countries which do not have data protection laws as strict as those in the UK. If you wish to access or correct the information that we hold about you, please contact our Data Protection Officer at 163 Bellville House, 4 John Donne Way, London SE10 9FW.
4.2 If you are the recipient or payee of an international payment we may deduct our charges and transfer fees for each such payment from the money transferred before making it available to you. If we deduct any charges under this clause 4.2, we will give you details in the information which we regularly provide to you (using the means agreed with us by which you wish to be notified) of the full amount of the money we receive and of the charges which we are deducting for receiving the money, before making the money available to you.
4.3 We may change any of our charges at any time. We will tell you (in accordance with clause 7.5 of these Terms and Conditions) at least 2 months before the change to the charge takes effect. Please see clause 7 of these Terms and Conditions which explains in more detail the procedures for changes to our contract terms.
4.4 Applicable exchange rates for payment transactions are set out on our Website, displayed prominently at our premises and those of our branches and agents or may be obtained by contacting us using the contact details set out in clause 1 of these Terms and Conditions. Payment transactions will be executed, unless otherwise agreed, in the currency of the destination country (but please note that in some countries payment is only available in U.S. dollars or another alternate currency). Currency will be converted from sterling (GBP) at the time of transfer and the payee will receive the relevant foreign currency amount. For transfers to certain countries, Our exchange rate may be less favourable than some publicly reported commercial exchange rates used in transactions between banks and other financial institutions. Any difference between our exchange rates offered to you and the exchange rates received by us will be kept by us, in addition to our transfer fees and other charges.
If you wish to transmit payments to countries that provide payment in multiple currencies, you must select the currency of the payment at the time you consent to the payment transfer. The transfer fees and charges and the money we make when changing your funds into foreign currency may vary based upon the payment currency that you select. Some payment service providers in foreign locations may offer payees the choice to receive funds in a currency which differs from the one that you select as payer. In such instances, we may make additional money when your funds are converted into the currency selected by the payee.
4.5 Our exchange rates are variable exchange rates which change constantly throughout the day. You can contact us to find out the exchange rate at a particular time using the contact details in clause 1 of these Terms and Conditions.
4.6 Telephone notification to the payee that the money transfer is available for pick-up is offered in most countries for an additional fee.
4.7 Messenger delivery of a cheque or bank draft is available in some countries to selected destinations for an additional fee.
4.8 Supplemental messages may be included with money transfers to most countries for an additional fee.
5.2 You must give consent before the execution of each payment transaction by giving us payment instructions in a signed and completed order form substantially in the form set out on the reverse of these Terms and Conditions which is available at our premises and those of our branches and agents or from our Website or by contacting us using the contact details set out in clause 1of these Terms and Conditions, by email, letter or facsimile transmission, in each case correctly addressed to us, or by handing it to us at our premises.
5.3 We shall have the right to stop the use of any personalised set of procedures agreed between you and us, which are used by you in order to initiate payment instructions to us, in order to comply with our legal obligations, or on reasonable grounds relating to:
• the security of such security features; or
• the suspected unauthorised or fraudulent use of such security features.
5.4 We will tell you by telephone, email, text message, Line, Facebook Fanpage or any other form of electronic communication by which you have chosen to be able to give us instructions before we stop the use of any personalised set of procedures, or as soon as possible afterwards if we are unable to notify you in advance, unless it would be unlawful or compromise our reasonable security measures to do so. Where possible, we will also tell you the reasons why.
5.5 We will execute payment instructions so that the amount to be transferred reaches the payee's payment service provider by:
• the end of the next business day after we received your instruction for THB payment transactions to a payee in Thailand;
• the end of the next business day after we received your instruction for sterling payment transactions to a payee in the UK;
• the end of the next business day after we received your instruction for all Euro payment transactions to a payee in the EEA; or
• the end of the fourth business day after we received your instruction for all payment transactions in EEA currencies (other than Euro) to a payee in the EEA.
For details of the execution times for payments to be made to a payee’s payment service provider outside of the EEA or payments in currencies other than EEA currencies, please contact us using the contact details set out in clause 1 of these Terms and Conditions or via our Website.
5.6 We must receive payment instructions before the cut-off time specified in our charges brochure or obtained by contacting us using the contact details set out in clause 1 of these Terms and Conditions or on our Website or we will deem the instruction to have been received on the next business day. Instructions received on days which are not business days for us will also be deemed to have been received on the next business day.
5.7 Once we receive your payment instruction, you cannot revoke it unless you inform us in writing that you withdraw your consent no later than the end of the business day before the agreed day of execution of the instruction.
5.8 Where we receive a payment instruction from you for execution on a specific day, you agree that the time of receipt is deemed to be that specific day on which we are to execute the payment instruction.
5.9 It is your responsibility to ensure that the monies you pay to us are sufficient to make each and every payment transaction which you authorise us to make. We will not make any money transfer instructed by you unless you have paid to us sufficient funds first. When we accept a credit or debit card or other non-cash form of payment from you we make no promise to make payment of any relevant money transfer if your form of payment is “uncollectable”, nor do we assume any liability for damages resulting from non-payment of the money because of uncollectability.
5.10 Applicable laws prohibit money transmitters from conducting business with certain individuals and countries. In order to comply, we are required to screen all transfers against the list of names provided by various governments and/or government agencies. If a potential match is found, we will suspend the transfer and request additional information on either the payer or the payee, as necessary. Upon satisfactory review, the payment transfer will be released for collection.
5.11 We have the right to refuse to accept a payment instruction or payment and to refuse to execute any payment transaction for any of the following reasons:
• if any condition in these Terms and Conditions has not been satisfied; or
• if execution would be unlawful.
5.12 If any payment instruction is declined you may contact us using the contact details set out in clause 1 of these Terms and Conditions or via our Website. If we have declined the payment instruction we will, where reasonably possible (and where we are not prevented from so doing by law or regulation) tell you why the payment instruction was declined at the earliest opportunity and in any event within the relevant time period specified in clause 5.5 of these Terms and Conditions. If the reason for our declining the payment instruction was based on incorrect information, we will agree with you what needs to be done to correct that information.
5.13 You agree that we may retain monies received by us for your benefit until our security validation, verification and anti-money laundering procedures have been completed before you may withdraw them or instruct us to transfer them. Our Website sets out a list of purposes for money transfers which you are prohibited from transacting, transmitting or receiving (including, without limitation, the purchase of drugs and weapons and, in certain countries, gambling activities). You agree that you will not transact, transmit or receive payment transfers for or in connection with any criminal or illegal purpose whatsoever. We may report any suspicious activity relating to your transactions to the relevant authorities.
5.14 Additional security questions may be required for certain payment transactions (regardless of the payment amount) and, in addition, the payee may be required to provide documentary evidence of their identity. Further information regarding the use of security questions for the destinations of your payment transfers is available on our Website or by contacting us using the contact details set out in clause 1 of these Terms and Conditions.
5.15 You may not be protected against reversals of money transfers in respect of which you are the payee where the reversal is due to the use of a stolen or unauthorised payment instrument or means of authentication by the payer. Once a payee has received a payment sent by us in accordance with your instructions as payer, that payment cannot normally be reversed.
• arising from the use of lost or stolen, or from the misappropriation of, personalised security features or procedures agreed between us and you for your
use in order to give us payment instructions, including (without limitation) an unauthorised payment transaction through any electronic communication or a misappropriation of the security features of our electronic communications service, is a maximum of £35. Subject to clause 6.1.2, we won’t hold you responsible up to £35 where: (i) the loss or theft of the personalised security features or procedures agreed between us and you was not detectable by you prior to the payment transaction; or (ii) the loss was caused by the acts or omissions of our employees, agent or branch, or an entity which carried out activities on our behalf, or
• where you have acted fraudulently or have with intent or gross negligence failed to: (i) take all reasonable steps to keep safe any of the personalised security features or procedures agreed between us and you for your use in order to give us payment instructions, including (without limitation) an unauthorised payment transaction through any electronic communication or a misappropriation of the security features of our electronic communications service, (ii) use such features and procedures in accordance with the terms and conditions governing their issue and use, or (iii) notify us in writing or by telephone using the contact details set out in clause 1 of these Terms and Conditions or via our Website and without undue delay on becoming aware of the loss, theft, misappropriation or unauthorised use of such security features or procedures, is the full amount of those losses.
6.2 Except where you have acted fraudulently, you will not be liable for any losses resulting from an unauthorised payment transaction: (i) after you have notified us of the loss, theft, misappropriation or unauthorised use of your security features or procedures in accordance with clause 6.1.2 of these Terms and Conditions; (ii) if we have not given you an appropriate means to notify us in accordance with clause 6.1.2; or (iii) if the security features or procedures have been used in connection with certain types of distance contract.
6.3 You may be entitled to redress for an unauthorised or incorrectly executed payment transaction only if you notify us in writing or by telephone using the contact details set out in clause 1 of these Terms and Conditions without undue delay on becoming aware of any unauthorised or incorrectly executed payment transaction, and in any event no later than 13 months after the debit date. Such redress may include, in relation to an unauthorised executed payment transaction, us refunding the amount of the unauthorised payment transaction to you as payer.
6.4 Where you initiate a payment instruction as payer, we are responsible to you for the correct execution of the payment transaction unless the payee's payment service provider received the amount of the payment transaction in accordance with the payment instruction execution times set out in clause 5.5 of these Terms and Conditions. You may request that we make immediate efforts to trace the payment transaction and notify you of the outcome.
6.5 Where we are liable to you as payer under clause 6.4 of these Terms and Conditions for a non-executed or defective payment transaction, we may without undue delay refund to you the amount of the transaction. If you ask us to make a payment and the payee’s payment service provider receives it later than set out in clause 5.5 of these Terms and Conditions, you can ask us and we will contact the payee’s payment service provider and ask them to correct the amount of interest and charges on the recipient’s payment account (if applicable) so that it is as if the payment was received on time.
6.6 Where you are the intended payee of a payment instruction initiated by a third party payer, and the payer's payment service provider can prove that we received the amount of the payment transaction in accordance with the payment instruction execution times set out in clause 5.5, we are liable to you for the correct execution of the payment transaction and shall immediately make available the amount of the payment transaction to you as payee.
6.7 If we are in breach of contract or otherwise negligent and we might reasonably have expected your loss to result directly from our breach or negligence, we are in any case liable to you.
6.8 We will not be liable for any losses not directly associated with any incident that may cause you to make a claim against us, nor are we liable for loss of profits, loss of business, loss of goodwill or any form of special damages whatsoever and howsoever arising and whether such liability was reasonably foreseeable or not and whether or not we have been advised of the possibility of such loss being incurred.
6.9 Nothing in clauses 6.7 and 6.8 of these Terms and Conditions excludes our liability for fraudulent misrepresentation by ourselves, our employees or agents or our liability for death or personal injury caused by our negligence or the negligence of our employees or agents.
6.10 Notwithstanding anything to the contrary in these Terms and Conditions, we shall not be liable to you or be obliged to perform our obligations under these Terms and Conditions if we are prevented, hindered or delayed from or in performing any of our obligations under these Terms and Conditions due to abnormal and unforeseeable circumstances beyond our control (including any strike, lock-out, labour dispute, act of God, war, riot, civil commotion, malicious damage, compliance with a law or governmental order, rule, regulation or direction, accident, breakdown or other failure of equipment, software or communications network, fire, flood, or other circumstances affecting the supply of goods or services).
6.11 You acknowledge that our Website is subject to periodic maintenance and testing and that you may not be able to access it from time to time as a result. We are not responsible for any loss you may suffer as a result of your being unable to access our Website at any time.
6.12 You must send us all relevant supporting documentation in relation to any claim you make for a refund or compensation.
7.2 We will notify you in writing at least 2 months before we make any change to these Terms and Conditions. You will be deemed to have accepted any such change if you do not notify us to the contrary before the date on which any such change comes into effect. However, if you choose not to accept any such change, you may give notice to us that you do not accept such change and you may terminate our agreement at any time, free of charge, before any change comes into effect.
7.3 If we have made a major change or a lot of minor changes in any one year, we will give you a copy of the new terms and conditions or a summary of the changes.
7.4 If we agree to fix any condition for a certain time, we will not change it during that time.
7.5 When we tell you about a change we will do so by letter, email, text or messages or in any other way which is sent to you individually or will do so in a way that we reasonably believe is likely to come to your attention and which satisfies legal and other regulatory requirements.
7.6 Our agreement under these Terms and Conditions will continue until terminated in accordance with this clause 7.
7.7 You may terminate our agreement under these Terms and Conditions by giving us at least 1 month's written notice. We shall not charge you for the termination of our agreement under these Terms and Conditions after the expiry of 6 months from its commencement.
7.8 We may terminate our agreement under these Terms and Conditions by giving you at least 2 months' written notice. Such termination will not release you from any liability in respect of any sums owing to us or from any previous liability for any act performed by us in accordance with instructions received from you.
8.2 A failure to exercise or delay in exercising a right or remedy provided by these Terms and Conditions or by law does not constitute a waiver of the right or remedy or a waiver of other rights or remedies. No single or partial exercise of a right or remedy provided by these Terms and Conditions or by law prevents further exercise of the right or remedy or the exercise of another right or remedy.
8.3 In case any provision in or obligation under these Terms and Conditions shall be invalid, illegal or unenforceable in any jurisdiction, the validity, legality and enforceability of the remaining provisions or obligations, or of such provision or obligation in any other jurisdiction, shall not in any way be affected or impaired thereby.
8.4 You may not assign, transfer or create any trust in respect of, or purport to assign, transfer or create any trust in respect of, a right or obligation under these Terms and Conditions.
8.5 Neither these Terms and Conditions nor any transaction carried out under them shall confer contractual or other rights on, or be enforceable against us by, any party other than you.
9.2 The courts of England have exclusive jurisdiction to settle any dispute arising from or connected with these Terms and Conditions and our agreement under these Terms and Conditions (including a dispute regarding their existence, validity or termination or relating to any non-contractual or other obligation arising out of or in connection with them) or the consequences of their nullity. You may also be eligible for redress for any dispute and matter arising out of or in connection with these Terms and Conditions through the dispute resolution mechanism provided by the Financial Ombudsman Service (please see below for further details).
10.2 We aim to provide the highest level of customer service possible. If you do experience a problem, we will always seek to resolve this as quickly and efficiently as possible. However, if you are unhappy and would like to make a complaint, please refer to our Complaints Policy for details of our internal process for dealing with complaints promptly and fairly. Our Complaints Policy is available on our Website or by contacting our customer service team using the contact details in clause 1 of these Terms and Conditions
10.3 We will then investigate the matter and try to reach a satisfactory conclusion. Complaints may be recorded and monitored for our internal use; we may submit an anonymised summary of complaints made to us during a particular period of time to our regulator. If you are not happy with our final response or, where you are eligible to refer your complaint to the Financial Ombudsman Service, if we have not concluded our investigation in
accordance with the timescales required by law, you may be able to refer your complaint to The Financial Ombudsman Service, South Quay Plaza, 183 Marsh Wall, London E14 9SR (http://www.financial-ombudsman.org.uk/).
10.4 You may also be able to submit a claim through the European Online Dispute Resolution Platform (available at http://ec.europa.eu/consumers/odr/).
SINGLE USE PAYMENT TERMS AND CONDITIONS
1. MONEY TRANSFER SERVICE
1.1 These terms and conditions govern the money transfer services provided to you by A&B General UK Ltd., of M228, Trident Business Centre,89 Bickersteth Road, London SW17 9SH, No. 6928080 (referred to as "we/our/us").
1.2 Our head office address is 163 Bellville House, 4 John Donne Way, London SE10 9FW, telephone number 02033559660, email This email address is being protected from spambots. You need JavaScript enabled to view it..
1.3 [The address of the branch or the agent providing the money transfer service is Second Floor, Pepys House, 10 Greenwich Quay, Clarence Rd, London SE8 3EY, telephone number 02033559660, email This email address is being protected from spambots. You need JavaScript enabled to view it.]
1.4 We are regulated by the Financial Conduct Authority under the Payment Services Regulations 2017 (registration number no. 716949) for the provision of payment services.
2 .SENDING A PAYMENT
2.1 You must give consent before the execution of each payment transaction by giving us payment instructions in a signed and completed payment instruction form (which is available at our premises and those of our branches and agents or from our Website or by contacting us using the contact details set out in clause 1 of these Terms and Conditions) by email, letter, in each case correctly addressed to us, or by handing it to us at our premises.
2.2 You must provide us with information which clearly identifies:
• the individual to whom you are sending the money (the "payee"); and/or
• details of the payee's payment account (if they have one).
Your payment instruction form will set out which information we need which could comprise the payee’s bank sort code and account number or, where applicable, the payee's SWIFT number, BIC and IBAN. It is your responsibility to check that the information you provide to us is correct.
3. TIMING
3.1 We will transfer your payment so that the money reaches the firm where your payee will collect it by:
• the end of the next business day after we received your instruction for sterling payment transactions to a payee in the UK;
• the end of the next business day after we received your instruction for Euro payment transactions to a payee in the EEA; or
• the end of the fourth business day after we receive your instruction for all payment transactions in EEA currencies (other than Euro) to a payee in the EEA.
3.2 For details of the execution times for payments to be made to a payee outside of the EEA or payments in currencies other than EEA currencies, please contact us for further details.
3.3 Where you want money transferred on a specific day, you agree that the time we receive your instruction is that specific day
3.4 If we did not receive your payment instruction before 16:00 on a business day for us (or if we received it on a day which is not a business day for us), we will treat it as if we received it on the next business day.
3.5 You cannot amend or cancel your instruction to us unless you have asked us to transfer your money on a specific day in the future and you give us written notice no later than the end of the business day before that specific day.
3.6 "business day" means a day on which we are open for business (other than a Saturday or Sunday or a public holiday).
4. FEES AND CHARGES
4.1 When you are sending money, you agree to pay us, at the time we accept your instruction to send your money transfer, the fees and charges (if any) which we write on your payment instruction form.
4.2 When you are receiving money, we may deduct, from the money transferred to us before we make it available to you, the fees and charges (if any) set out in the written information we give you when you receive the money.
5. EXCHANGE RATE
5.1 We will write on your payment instruction form or receipt the exchange rate applied to your money transfer when you are sending or receiving money. We usually convert your money from sterling (£) at the time of you making payment the relevant amount in the currency of the country where the payee is located
6. GENERAL
6.1 We are not obliged to perform our obligations if abnormal and unforeseeable circumstances beyond our control prevent us from doing so.
6.2 You may be entitled to redress for an incorrectly executed money transfer only if you notify us without undue delay on becoming aware of it, and in any event no later than 13 months after the date of the transfer.
6.3 Where you are sending money, we are responsible to you for the correct execution of the money transfer unless the payee's payment service provider received the amount of the payment transaction in accordance with the payment transfer times set out in clause 3.1 of these Terms and Conditions. You may request that we make immediate efforts to trace the payment transaction and notify you of the outcome.
6.4 Where we are liable to you as payer under clause 6.3 of these Terms and Conditions for a non-executed or defective payment transaction, we will without undue delay refund to you the amount of the transaction. If you ask us to make a payment and the payee’s payment service provider receives it later than the payment transfer times set out in clause 3.1 of these Terms and Conditions, you can ask us and we will contact the payee’s payment service provider and ask them to correct the amount of interest and charges on the payee’s payment account (if applicable) so that it is as if the payment was received on time.
6.5 Where you are the intended payee of a payment instruction initiated by a third party payer, and the payer's payment service provider can prove that we received the amount of the payment transaction in accordance with the payment transfer times set out in clause 3.1 of these Terms and Conditions, we are liable to you for the correct execution of the payment transaction and shall immediately make available the amount of the payment transaction to you as payee.
6.6 No compensation is available from the Financial Services Compensation Scheme if we are unable to meet our obligations. Our relationship with you is not that of a bank or trustee.
6.7 Neither these Terms and Conditions nor any transaction carried out under them shall confer contractual or other rights on, or be enforceable against us by, any party other than you.
6.8 We are not liable for any losses not directly associated with any incident that may cause you to make a claim against us, nor are we liable for loss of profits, loss of business, loss of goodwill or any form of special damages.
6.9 You agree that you are not sending or receiving a payment transfer for or in connection with any criminal or illegal purpose.
6.10 We can communicate with you by telephone, email, text message and/or in writing or any other form of electronic communication by which you have chosen to be able to give us
instructions. And all information provided, made available and notified to you shall be in English.
6.11 We will contact you by telephone, email, text message if there are suspected or actual frauds or security threats.
6.12 We may use information about you to discharge our anti-money laundering, security validation and verification responsibilities, to provide our services and to manage our relationship with you. We may disclose this information to payers, payees and intermediaries in the course of providing our services or as required by Regulation EC 2015/847 on information on the payer accompanying transfers of funds; persons with whom we share information for anti-money-laundering, security verification or validation purposes; regulatory and prosecuting authorities; service providers acting on our behalf. This may involve transfer of information to countries which do not have data protection laws as strict as those in the UK. If you wish to access or correct the information that we hold about you, please contact our Data Protection Officer at «RAddress1».
7. LAW AND JURISDICTION
7.1 These Terms and Conditions and all matters arising from or connected with them are governed by English law. The courts of England have exclusive jurisdiction to settle any dispute arising from or connected with these Terms and Conditions (including a dispute regarding their existence, validity or termination or relating to any non-contractual or other obligation arising out of or in connection with them) or the consequences of their nullity.
8. COMPLAINTS
8.1 Please tell us if you have any problems with our service: we will seek to resolve your complaint as quickly as possible. If you are not happy with our response, or, where you are eligible to refer your complaint to the Financial Ombudsman Service, if we have not finished investigating your complaint in accordance with the timescales required by law, you may be able to refer your complaint to The Financial Ombudsman Service, South Quay Plaza, 183 Marsh Wall, London E14 9SR (http://www.financial-ombudsman.org.uk/).
8.2 You may also be able to submit a claim through the European Online Dispute Resolution Platform (available at http://ec.europa.eu/consumers/odr/).
Currency |
A&B MONEY |
A&B PLUS |
Selling Rate | ||
Normal Rate | Reward Rate | Plus Rate | Plus Reward | Normal Rate | |
GBP | 00.00 | 00.00 | N/A | N/A | N/A |
EUR | 00.00 | 00.00 | N/A | N/A | N/A |
USD | 00.00 | N/A | N/A | N/A | N/A |
SEK | 00.00 | 00.00 | N/A | N/A | N/A |
JPY | 00.00 | 00.00 | N/A | N/A | N/A |
HKD | 00.00 | 00.00 | N/A | N/A | N/A |
CNY | 00.00 | 00.00 | N/A | N/A | N/A |
All Exchange Rate valid from 9.30-17.00
head1 | head2 | head3 | head4 |
---|---|---|---|
cell1_1 | cell2_1 | cell3_1 | cell4_1 |
cell1_2 | cell2_2 | cell3_2 | cell4_2 |
cell1_3 | cell2_3 | cell3_3 | cell4_3 |
cell1_4 | cell2_4 | cell3_4 | cell4_4 |
Reward Rate! is the rate that's higher than all high street UK banks or every money transfer shop in the UK and Thailand. The rate is for clients who transfer money over £5,000 or under membership conditions. You can aim our Reward Rate with only 1% from amount of transfer.
Available for 3 Currencies below
1. Reward Rate available for Payment above 5,000 GBP/EUR or 30,000 SEK
2. You can redeem reward rate by debit card via maximum exceed at 5,000 GBP/EUR
3. Cash unable to redeem on reward Rate
4. You cannot redeem reward rate along with other benefits i.e. Free of Charge
if you live in the UK or anywhere in the EU and would like to own a money transfer business with a full licence and regulation we are here to assist, counsel, and provide you with
- IT Data System for your customer information and Trading System
- KYC and AML Checks
- Sanction Secured and PEPs
- Bookkeeping
- Website
- FX Markets
- Hubs Payment transactions
- Regulation & Licence
if you are interested to become our partner please contact us on 0203 355 9660
Email : This email address is being protected from spambots. You need JavaScript enabled to view it.