Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DOC-838 Fraud education page #233

Open
wants to merge 5 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions docs/partnership/partials/_trust-center.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
:::info Trust Center
Visit [Swan's Trust Center](https://trust.swan.io/) for live information about Swan's security.
Understand security measures in depth, review policies, and find answers to frequent security questions.
:::
18 changes: 18 additions & 0 deletions docs/partnership/protections/data.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
---
title: Data protection
---
import TrustCenter from '../partials/_trust-center.mdx';

# Data protection

Because Swan is a financial institution supervised by the *Banque de France*, Swan has a regulatory requirement to [verify the identity of all users](../../topics/users/identifications/index.mdx).
Your users often verify their identity through a short video of their face, which is a great way for Swan to prevent fraud.

Swan processes and stores these videos with great care.
Videos are encrypted in Swan's systems and stored in European data centers.
User data is never transferred outside of Europe.
Additionally, only Swan teams responsible for verifying identities and teams in charge of compliance with banking regulations can access these videos.

Swan is required by law to keep data for **five years after an [account is closed](../../topics/accounts/closure/index.mdx)**, in accordance with [French banking regulations](https://www.legifrance.gouv.fr/codes/article_lc/LEGIARTI000041577784).

<TrustCenter />
29 changes: 29 additions & 0 deletions docs/partnership/protections/financial.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
---
title: Protecting funds
---
import TrustCenter from '../partials/_trust-center.mdx';

# Protecting funds

Regardless of what happens to Swan, **your money is always secure**.

This is a non-negotiable requirement of all [e-money licenses](../index.mdx#license) that Swan takes seriously.
Swan protects you and all of your accounts holders with a safeguarding account that offers **two layers of protection**.

<TrustCenter />

## Layer 1: Safeguarding account {#protecting-funds-account}

All funds belonging to Swan account holders are safeguarded in an account at BNP Paribas, completely separate from Swan's accounts.

- E-money institutions are **required to hold onto your funds**, meaning Swan **can't invest them**.
- Therefore, **all of your funds** are in this safeguarding account.
- In the case that Swan goes bankrupt, your funds are **secure** at the safeguarding bank.

## Layer 2: Crisis operator {#protecting-funds-operator}

In the case that Swan's safeguarding bank goes bankrupt, the [Fonds de Garantie des Dépôts et de Résolution (FGDR)](https://www.garantiedesdepots.fr/en) **protects each account holder for up to €100 000** (one hundred thousand euros).
In English, FGDR translates to *Deposit Guarantee and Resolution Fund*, and it's a French fund that extends to all accounts at French e-money institutions.

- The FGDR applies to individuals and companies (natural and legal persons) with a few exceptions (for example, banks as legal persons).
- If Swan's safeguarding bank goes bankrupt, Swan's ledger will be the single source of truth and all account holders, regardless of nationality, will be reimbursed by the FGDR.
156 changes: 156 additions & 0 deletions docs/partnership/protections/fraud.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,156 @@
---
title: Fraud protection
---

# Fraud protection

Fraud attempts grow more complex every day.
It's important to know about common types of fraud and how Swan works to keep you and your users safe.
This way, you can help your users avoid becoming victims of malicious intent.

import TrustCenter from '../partials/_trust-center.mdx';

<TrustCenter />

## How Swan protects you and your users {#swan-protections}

Your protection is Swan's priority.
Consider the following ways in which Swan keeps you and your users safe.

<table>
<tr>
<th>Area</th>
<th>Protection</th>
</tr>
<tr>
<td rowspan="3">💬 **Contact with your users** ∗</td>
<td>Swan never calls your users without previously notifying them. If your users receive an unexpected phone call from Swan, strongly encourage them to hang up and inform you and Swan immediately.</td>
</tr>
<tr>
<td>In place of emailing Support, Swan prefers that both you and your users open tickets. The [partner](https://partner-support.swan.io/hc/en-gb/requests/new) and [end-user](https://support.swan.io/hc/en-150/requests/new?ticket_form_id=18444696903837) support forms initiate a secure way to communicate about sensitive topics.</td>
</tr>
<tr>
<td>Swan doesn't request sensitive personal or account information by phone or email. Your users might be asked to verify their name or phone number, but nothing more.</td>
</tr>
<tr>
<td rowspan="3">🔐 **Authentication** and **Consent**</td>
<td>To access Swan platforms, you and your users must [log in](../../topics/users/index.mdx#login). If there's no activity for a set time period, you're [automatically logged out](../../developers/index.mdx#ttl) to ensure the security of your account.</td>
</tr>
<tr>
<td>Swan uses a mix of biometrics, passcodes, and one-time passwords to secure access to Swan platforms.</td>
</tr>
<tr>
<td>You and your users must [consent](../../topics/users/consent/index.mdx#sensitive) to all sensitive operations.</td>
</tr>
<tr>
<td rowspan="3">💶 **Payments**</td>
<td>Swan offers [single-use virtual cards (SUVs)](../../topics/cards/virtual/index.mdx#suv). Consider prioritizing issuing SUVs as it's more difficult to use them fraudulently.</td>
</tr>
<tr>
<td>You and your users can save [trusted beneficiaries](../../topics/payments/credit-transfers/index.mdx#beneficiaries). Only eligible account members can send credit transfers to unsaved beneficiaries.</td>
</tr>
<td>When making online payments, you and your users are required to complete [3-D Secure (3DS)](../../topics/payments/cards/index.mdx#3ds), an extra security layer when paying online. Please note that 3DS might be bypassed if Mastercard deems a payment low risk.</td>
</table>

∗ *You, your users, and Swan each have a direct relationship due to the [three-party partnership model](../index.mdx#model).
As a result, Swan can contact your users directly, when necessary, under strict privacy guidelines.*


## Common types of fraud {#types}

### Account takeover (ATO) {#ato}

Account takeover fraud occurs when those committing fraud gain control of a victim's payment account, and then use the account to perform unauthorized actions.

:::note Tips to combat ATO fraud
- Keep account **login information secure**.
- Use **strong, unique passwords** and passcodes.
- **Don't share account details** by email, phone call, or text message.
:::

### Authorized push payment (APP) {#app}

With APP fraud, those committing fraud trick victims into sending money from the victim's account to a legitimate account managed by the malicious actors.

They impersonate trusted organizations or people—including people your users may know—and convince victims to transfer sizable sums of money urgently.
APP fraud often occurs by email or over the phone.

:::note Tips to combat APP fraud
- **Contact the organization or person directly** in a new email or phone call to ask about the request.
- Don't do anything **urgently**.
- **Check links before you open them**. Is there a spelling error or typo in the domain name? Are there extra characters, letters, or numbers in the link?
:::

### Card {#card}

Those committing card fraud **steal virtual card details**, such as card numbers and card verification values or codes (CVVs or CVCs), or **actual physical cards**.
Then, they use that information to make payments online or by phone, where the purchaser's physical card or presence isn't required.

Types of card fraud include **remote purchase fraud**, **card not present (CNP) fraud**, and any activity with **lost**, **stolen**, or **misplaced cards**.

:::note Tips to combat card fraud
- Only enter card details on websites with a **secure connection**.
- Only enter the card number and security code into **fields designed for those numbers**. Don't enter card details in free-text fields, which are open for any type of text input.
- **Block (cancel) lost or stolen cards immediately**. If you use Swan's Web Banking, send your users the [Support Center article about blocking cards](https://support.swan.io/hc/en-150/articles/18538920070045-Blocking-your-card).
:::

### Chief Executive Officer (CEO) {#ceo}

CEO fraud, also known as business email compromise (BEC), is cybercrime where individuals impersonate a company's CEO or other top executive.
These individuals send **convincing emails** to company employees that seem to require **immediate and urgent attention**.
In the email, they might request the employee to transfer funds, provide access to secure portals or documents, or otherwise reveal confidential information about the company.

Consider the following example:

> Subject: Urgent financial matter (confidential)
>
> Hi Alex,
>
> There's been an urgent development and we need to pay an invoice immediately.
> I'm in a critical meeting and can't send this transaction myself.
> Could you please handle this right away?
>
> *includes transfer details*
>
> Let me know when it's done.
>
> Thanks,<br />
> Jules<br />
> CEO, MyBrand
<br />

:::note Tips to combat CEO fraud
- **Confirm the email address**. Is there a spelling error or typo in the executive's name? Are there extra characters, letters, or numbers in the domain name?
- If you've received other emails from this executive, **does this email look like the others**? Or are there slight differences in style, spacing, and voice?
- Even when a request comes from an executive, **never bypass established security measures**.
- **Contact the executive using another channel**. If you received an email, for example, try calling or sending them a direct message on the company's messaging platform.
:::

### Phishing {#phishing}

Phishing involves those committing fraud impersonating legitimate organizations, such as companies or governmental agencies, through email or text message.
They attempt to steal sensitive information, including user names and passwords, government ID numbers, financial information, and more.
Phishing emails and text messages can be quite convincing, often including links to websites that look almost identical to the organization's real website.

:::note Tips to combat phishing fraud
- **Contact the organization directly** in a new email or by phone to ask them about the message you received.
- **Check links before you open them**. Is there a spelling error or typo in the domain name? Are there extra characters, letters, or numbers in the link?
- **Open websites directly** in your browser instead of clicking links included in an email or text message.
:::

## Report fraud {#report}

:::danger Report fraud
If your users are victims of fraud with their Swan payment accounts, they need to **file a fraud dispute with Swan**.
:::

Share the dedicated Support Center article to help your users file their report:

- [English](https://support.swan.io/hc/en-150/articles/17099978406045)
- [Dutch ***nederlands***](https://support.swan.io/hc/nl/articles/17099978406045)
- [Finnish ***suomi***](https://support.swan.io/hc/fi/articles/17099978406045)
- [French ***français***](https://support.swan.io/hc/fr/articles/17099978406045)
- [German ***deutsch***](https://support.swan.io/hc/de/articles/17099978406045)
- [Italian ***italiano***](https://support.swan.io/hc/it/articles/17099978406045)
- [Portuguese ***português***](https://support.swan.io/hc/pt/articles/17099978406045)
- [Spanish ***español***](https://support.swan.io/hc/es/articles/17099978406045)
87 changes: 87 additions & 0 deletions docs/partnership/protections/report-vulnerability.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,87 @@
---
title: Report a vulnerability
---
import TrustCenter from '../partials/_trust-center.mdx';

# Report a vulnerability

Swan prioritizes offering secure services and protecting all Swan accounts.
Researchers and the Swan community are encouraged to report all security-related issues.
Swan thoroughly investigates all reports internally while coordinating with you to fix the issue and prepare a responsible disclosure.

<TrustCenter />

## Report a vulnerability {#report}

To make a security vulnerability report, email [email protected] with the full details, including steps to reproduce the issue.

If you'd like to encrypt the email (not required), please use the provided GNU Privacy Guard (GPG) key, attributed to Swan's security team.

<details>
<summary>Encryption GNU Privacy Guard (GPG) key</summary>

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=LEk2

-----END PGP PUBLIC KEY BLOCK-----
</details>

:::tip Please file a report if...
1. You think you discovered a potential security vulnerability in Swan's APIs or services.
1. You are unsure how a vulnerability affects Swan's APIs or services.
1. You think you discovered a vulnerability in another project that Swan depends on.
:::

:::danger Please don't file a report if...
1. You need help fine-tuning Swan components for security.
1. Your issue isn't security related.
:::
4 changes: 4 additions & 0 deletions redirects.js
Original file line number Diff line number Diff line change
Expand Up @@ -442,4 +442,8 @@ module.exports = [
from: "/topics/accounts/documents/guide-upload",
to: "/topics/accounts/documents/guide-upload-onboarding",
},
{
from: "/partnership/overview/protections",
to: "/partnership/protections/financial/",
},
];
13 changes: 12 additions & 1 deletion sidebars.js
Original file line number Diff line number Diff line change
Expand Up @@ -532,11 +532,22 @@ module.exports = {
collapsed: true,
items: ["partnership/overview/guide-orias"],
},
"partnership/overview/protections",
"partnership/overview/rules-regulations",
"partnership/overview/country-coverage",
],
},
{
type: "category",
label: "Protections",
collapsible: false,
collapsed: false,
items: [
"partnership/protections/financial",
"partnership/protections/fraud",
"partnership/protections/data",
"partnership/protections/report-vulnerability",
],
},
{
type: "category",
label: "Document center",
Expand Down
2 changes: 0 additions & 2 deletions styles/alex/ProfanityUnlikely.yml
Original file line number Diff line number Diff line change
Expand Up @@ -117,7 +117,6 @@ tokens:
- fire
- firing
- fore
- fraud
- funeral
- fungus
- gay
Expand Down Expand Up @@ -202,7 +201,6 @@ tokens:
- redlight
- refugee
- reject
- remains
- republican
- roach
- robber
Expand Down