Kingsport Times News Monday, July 28, 2014
Business & Technology

ECU says cardholders will not be responsible for fraudulent charges

January 29th, 2009 12:00 am by Sharon Hayes






KINGSPORT — Eastman Credit Union wants its cardholders to know they will not be held financially responsible for any unauthorized transactions following a security breach that may have compromised thousands of debit and credit cards across the country.


“Please continue to review your account history,” ECU’s Web site said Thursday. “In the unlikely event an unauthorized transaction does occur, as an ECU cardholder, you will not be held financially responsible for any unauthorized transactions that are reported to ECU in a timely manner.”


Kingsport-based Eastman Credit Union and other financial institutions across the country were notified of the security breach at Heartland Payment Systems, which provides debit and credit card processing services for approximately 250,000 businesses nationwide, including restaurants, online merchants, pay-at-the pump gas stations, and other retailers.


On its Web site Thursday, ECU said a small percentage of its members’ debit and credit cards have been compromised.


Compromised data includes the cardholder name, card numbers and expiration dates.


ECU personal identification numbers (PINs) were not compromised due to encryption, ECU officials said.


“Please be assured, there was NO security breach within Eastman Credit Union. ECU uses state-of-the-art technology and employs the highest level of security available today to protect ECU member-owners’ personal information,” ECU’s Web site said.


Heartland is not one of ECU’s vendors, nor is it associated with ECU in any way.


“Instead they process credit and debit card transactions for merchants with whom you may do business,” the Web site says.


ECU Card Services will contact cardholders whose personal information is believed to have been among those compromised in the security breach.


For more information visit eastmancu.org or http://2008breach.com/.


 

comments powered by Disqus