SlideShare a Scribd company logo
1 of 101
Accepting Credit Cards



                                 Bruce Policky
                                   Product Manager
                                Tabs3 & PracticeMaster




© Software Technology, Inc.
What we’ll talk about today

        •Accepted Methods of Payment
        •Why accept credit cards?
        •How credit card processing works in Tabs3
        •Trust Accounting Considerations
        •TSYS Merchant Solutions




© Software Technology, Inc.
Accepted Methods of Payment?

        •Bartering




© Software Technology, Inc.
Accepted Methods of Payment?

        •Bartering
        •Gold




© Software Technology, Inc.
Accepted Methods of Payment?

        •Bartering
        •Gold
        •Cash




© Software Technology, Inc.
Accepted Methods of Payment?

        •Bartering
        •Gold
        •Cash
        •Check




© Software Technology, Inc.
Accepted Methods of Payment?

        •Bartering
        •Gold
        •Cash
        •Check
        •Credit Card




© Software Technology, Inc.
Why accept credit cards?

        •Customers want to use credit cards
        •Improve Cash Flow
        •Increase Revenue
        •Shift the Risk
        •Save Time
        •Easy & Affordable


                                        © 2007 Microsoft




                                                           © 2007 Microsoft


© Software Technology, Inc.
How Credit Card Processing
                    works in Tabs3




© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
Trust Accounting Considerations

        •Tabs3 Trust Accounting System Version 15.3
        allows credit card deposits
        •Check with your local bar
        •Use separate merchant accounts to avoid
        commingling funds




© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
© Software Technology, Inc.
•   Top 10 payment processor
       •   Over 50 years of experience
       •   Safety and security
       •   Local support




© Software Technology, Inc.
Contact

TSYS Merchant Solutions:
       • Toll Free: (800) 354-3988
       • merchantaccount@tabs3.com
       • www.tabs3.com/cci
Tabs3:
       • Support: (402) 419-2210
       • Sales: (402) 419-2200
© Software Technology, Inc.

More Related Content

Viewers also liked

D J Powers Co., Inc. Overview
D J Powers Co., Inc. OverviewD J Powers Co., Inc. Overview
D J Powers Co., Inc. OverviewCarolHendrickson
 
Blu ray to dvd – how to copy blu-ray to dvd for blu-ray backup
Blu ray to dvd – how to copy blu-ray to dvd for blu-ray backupBlu ray to dvd – how to copy blu-ray to dvd for blu-ray backup
Blu ray to dvd – how to copy blu-ray to dvd for blu-ray backupLeawo Soft
 
Market research analysissharmara
Market research analysissharmaraMarket research analysissharmara
Market research analysissharmarashamoye
 
Integrating Social Media and Marketing Automation
Integrating Social Media and Marketing AutomationIntegrating Social Media and Marketing Automation
Integrating Social Media and Marketing AutomationOktopost
 
Galvanized Before Weave Chain Link Fence
Galvanized Before Weave Chain Link FenceGalvanized Before Weave Chain Link Fence
Galvanized Before Weave Chain Link FenceDonovan Ford
 
Grafico diario del dax perfomance index para el 02 12-2011
Grafico diario del dax perfomance index para el 02 12-2011Grafico diario del dax perfomance index para el 02 12-2011
Grafico diario del dax perfomance index para el 02 12-2011Experiencia Trading
 
Word of The Day
Word of The DayWord of The Day
Word of The Daybrandorf80
 

Viewers also liked (12)

D J Powers Co., Inc. Overview
D J Powers Co., Inc. OverviewD J Powers Co., Inc. Overview
D J Powers Co., Inc. Overview
 
Question 3
Question 3  Question 3
Question 3
 
Blu ray to dvd – how to copy blu-ray to dvd for blu-ray backup
Blu ray to dvd – how to copy blu-ray to dvd for blu-ray backupBlu ray to dvd – how to copy blu-ray to dvd for blu-ray backup
Blu ray to dvd – how to copy blu-ray to dvd for blu-ray backup
 
jenadminresNEW
jenadminresNEWjenadminresNEW
jenadminresNEW
 
Market research analysissharmara
Market research analysissharmaraMarket research analysissharmara
Market research analysissharmara
 
Integrating Social Media and Marketing Automation
Integrating Social Media and Marketing AutomationIntegrating Social Media and Marketing Automation
Integrating Social Media and Marketing Automation
 
Lv hyouhon2 m
Lv hyouhon2 mLv hyouhon2 m
Lv hyouhon2 m
 
Practica 1
Practica 1Practica 1
Practica 1
 
Galvanized Before Weave Chain Link Fence
Galvanized Before Weave Chain Link FenceGalvanized Before Weave Chain Link Fence
Galvanized Before Weave Chain Link Fence
 
Sex
SexSex
Sex
 
Grafico diario del dax perfomance index para el 02 12-2011
Grafico diario del dax perfomance index para el 02 12-2011Grafico diario del dax perfomance index para el 02 12-2011
Grafico diario del dax perfomance index para el 02 12-2011
 
Word of The Day
Word of The DayWord of The Day
Word of The Day
 

Similar to Accepting Credit Cards

Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...Melanie Brandt
 
Eit corporate presentation
Eit corporate presentationEit corporate presentation
Eit corporate presentationEitpresentation
 
Eit corporate presentation
Eit corporate presentationEit corporate presentation
Eit corporate presentationEitpresentation
 
Eit corporate presentation
Eit corporate presentationEit corporate presentation
Eit corporate presentationeitwork
 
Atlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQAtlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQServiceRocket
 
Software architecture for developers by Simon Brown
Software architecture for developers by Simon BrownSoftware architecture for developers by Simon Brown
Software architecture for developers by Simon BrownCodemotion
 
company Software profile
company Software profilecompany Software profile
company Software profileNeha Gupta
 
Digital Workspace Deployment and Performance Monitoring in the New Normal - S...
Digital Workspace Deployment and Performance Monitoring in the New Normal - S...Digital Workspace Deployment and Performance Monitoring in the New Normal - S...
Digital Workspace Deployment and Performance Monitoring in the New Normal - S...eG Innovations
 
Chit fund software, money chit fund software, chit fund software, chit fund
Chit fund software, money chit fund software, chit fund software, chit fundChit fund software, money chit fund software, chit fund software, chit fund
Chit fund software, money chit fund software, chit fund software, chit fundRavi Pseo
 
Instant Technology Overview
Instant Technology OverviewInstant Technology Overview
Instant Technology Overviewkprizy
 
GPSTEC318-IoT Security from Manufacturing to Maintenance
GPSTEC318-IoT Security from Manufacturing to MaintenanceGPSTEC318-IoT Security from Manufacturing to Maintenance
GPSTEC318-IoT Security from Manufacturing to MaintenanceAmazon Web Services
 
Wer, was, wo: Inhalte schützen und unberechtigte Zugriffe verhindern
Wer, was, wo: Inhalte schützen und unberechtigte Zugriffe verhindernWer, was, wo: Inhalte schützen und unberechtigte Zugriffe verhindern
Wer, was, wo: Inhalte schützen und unberechtigte Zugriffe verhindernDennis Hobmaier
 
Presentation - Cybria
Presentation - CybriaPresentation - Cybria
Presentation - Cybriasourav khilar
 
Creating and Managing a Paperless Enterprise
Creating and Managing a Paperless EnterpriseCreating and Managing a Paperless Enterprise
Creating and Managing a Paperless EnterpriseProvokeSolutionsSeattle
 
Recruiting Slide Linked In
Recruiting Slide   Linked InRecruiting Slide   Linked In
Recruiting Slide Linked Inua131313
 
Citrix Troubleshooting 101
Citrix Troubleshooting 101Citrix Troubleshooting 101
Citrix Troubleshooting 101eG Innovations
 

Similar to Accepting Credit Cards (20)

Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...
 
rapid! Paycard
rapid! Paycardrapid! Paycard
rapid! Paycard
 
Eit corporate presentation
Eit corporate presentationEit corporate presentation
Eit corporate presentation
 
Eit corporate presentation
Eit corporate presentationEit corporate presentation
Eit corporate presentation
 
Eit corporate presentation
Eit corporate presentationEit corporate presentation
Eit corporate presentation
 
Containers for Startups
Containers for StartupsContainers for Startups
Containers for Startups
 
Atlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQAtlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQ
 
Software architecture for developers by Simon Brown
Software architecture for developers by Simon BrownSoftware architecture for developers by Simon Brown
Software architecture for developers by Simon Brown
 
ICS - Introduction
ICS - IntroductionICS - Introduction
ICS - Introduction
 
company Software profile
company Software profilecompany Software profile
company Software profile
 
Digital Workspace Deployment and Performance Monitoring in the New Normal - S...
Digital Workspace Deployment and Performance Monitoring in the New Normal - S...Digital Workspace Deployment and Performance Monitoring in the New Normal - S...
Digital Workspace Deployment and Performance Monitoring in the New Normal - S...
 
Chit fund software, money chit fund software, chit fund software, chit fund
Chit fund software, money chit fund software, chit fund software, chit fundChit fund software, money chit fund software, chit fund software, chit fund
Chit fund software, money chit fund software, chit fund software, chit fund
 
Instant Technology Overview
Instant Technology OverviewInstant Technology Overview
Instant Technology Overview
 
GPSTEC318-IoT Security from Manufacturing to Maintenance
GPSTEC318-IoT Security from Manufacturing to MaintenanceGPSTEC318-IoT Security from Manufacturing to Maintenance
GPSTEC318-IoT Security from Manufacturing to Maintenance
 
Wer, was, wo: Inhalte schützen und unberechtigte Zugriffe verhindern
Wer, was, wo: Inhalte schützen und unberechtigte Zugriffe verhindernWer, was, wo: Inhalte schützen und unberechtigte Zugriffe verhindern
Wer, was, wo: Inhalte schützen und unberechtigte Zugriffe verhindern
 
Presentation - Cybria
Presentation - CybriaPresentation - Cybria
Presentation - Cybria
 
Creating and Managing a Paperless Enterprise
Creating and Managing a Paperless EnterpriseCreating and Managing a Paperless Enterprise
Creating and Managing a Paperless Enterprise
 
Recruiting Slide Linked In
Recruiting Slide   Linked InRecruiting Slide   Linked In
Recruiting Slide Linked In
 
Citrix Troubleshooting 101
Citrix Troubleshooting 101Citrix Troubleshooting 101
Citrix Troubleshooting 101
 
SCS Service_PPT
SCS Service_PPTSCS Service_PPT
SCS Service_PPT
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Accepting Credit Cards

Editor's Notes

  1. Welcome & IntroductionsHello, I am Bruce Policky, Product Manager for Tabs3 & PracticeMasterWelcome to today’s webinar – Accepting Credit CardsToday’s session is being provided “Presentation Style”Which means incoming audio is muted.I am joined today by Marcia Nordmeyer who will be monitoring the Chat logYou can use the Chat feature to post questions through-out the sessionMarcia will answer some questions real-timeOther questions will be answered at the end of the sessionWe may directly contact you after the webinar to answer questions specific to your firm
  2. What we’ll talk about today Accepted Methods of PaymentsWhy your firm should accept credit cardsHow credit card processing works in Tabs3Trust Accounting considerationsTSYS Merchant Solutions- Payment Processor for Tabs3 and Tabs3 Trust AccountingI will turn the presentation over to Ben Wallace from TSYS Merchant Solutions at that time.Questions/Answers
  3. Accepted Methods of Payment - Through history, money has taken many different forms. Bartering was the first form of PaymentBartering – Not Efficient or Convenient
  4. Gold - Society evolved to Gold and other Precious metals
  5. Cash – Then to Paper money and coins - Reliable but still not convenient
  6. Checks became an extension of our Paper money and the most popular method of payment
  7. Credit Card - Today, the majority of money exchanged takes no physical form. Studies show that credit card payments will overtake cash and check payments within the next few years.
  8. Why accept credit cards?Times have changed This Webinar is a great example of how society has evolved.Like Credit Cards, a Webinar is more cost effective and convenient How we communicate is changing and so is how we pay our bills.Clients WANT to pay by Credit Card. A recent national poll indicates that over 80% of Americans believe credit cards are essential*. I admit, I am a Credit Card User!We use them to buy groceries, buy office furniture, take clients to lunch, even to pay the dentist. It only makes sense that this method of payment be available from their attorney too. Credit Cards give customers more flexibility to manage their cash flow.Customers often get benefits for paying with credit cards (i.e., frequent flier miles or other affinity points. Improve Cash Flow Get paid fasterLaw firms that accept credit card payments are more likely to:Get paid right awayGet paid in fullYou may find clients willing to pay with a credit card on their way out of your office Conveniently receive credit card payments over the phoneImmediate payment – don’t have to wonder if “the checks in the mail”Increase RevenueTurn A/R into ReceiptsCollect on outstanding Invoices Reduce write offsTake on clients not otherwise immediately able to hire an attorneyShift the RiskIf you are in doubt as to whether the client can pay; orIf the client has poor payment history – more reasons to accept credit cardsHave a plan for getting paid before having to write-off balancesYou are your clients lawyer; Don’t be your client’s Banker too Save TimeEnter credit card transactions directly in Tabs3Include a credit card remittance form with your statements Spend less time making collections calls & more time on Billable workLet the credit card companies do the collections workEasy and AffordableIntegrated Credit Card Processing electronically processes authorized credit card payments directly within Tabs3 and deposits within Tabs3 Trust Accounting. No additional equipment requiredReceive special negotiated rates
  9. How credit card processing works in Tabs3Tabs3 works with TSYS Merchant Solutions to provide merchant accounts for use in Tabs3 and Tabs3 Trust Accounting Software. Secure, fully compliant credit card processing Tabs3 Credit Card Authorization Module has been reviewed and accepted by the Payment Card Industry Security Standards Council (PCI SSC) <<Switch to Tabs3 >>Tabs3 Customization | Merchant Services “What is a merchant account?”A pass through account that enables your firm to receive cash from credit card transactions. The ability to authorize Credit Card transactions is provided with Tabs3 at no charge, but the TSYS merchant account does incur processing fees. The types of credit cards accepted can be defined for each merchant account and include Visa®, MasterCard®, Discover®, American Express®, and Diners Club®.Payfuse – is the portal used by FNMS to handle the credit card transaction<<Switch to Tabs3 Payment Editor>>  When a credit card payment is entered into Tabs3, the transaction information is sent to FNMS for processing. Tabs3 encrypts and transmits cardholder data to FNMS; however, Tabs3 does not store sensitive cardholder information. Firms can have these payments from their FNMS merchant account deposited directly into their existing bank accountsThere is no need to change your existing overall banking relationships. <<Enter a Credit Card Payment>>For ease of use, Tabs3 credit card authorization supports integration with Magtek® Magstripe Mini Swipe (USB) credit card readers. Using a card reader may also reduce the fees for a credit card transaction.Credit Card Receipt - when authorized as well as at a later time.Credit Card Authorization List - print a list of authorized credit card transactionsYou can include charges, voids, credits, or any combination thereof. This report can be used to balance with your Settlement Reports on the PayFuse Web site.Tabs3 Credit Card Authorization also supports Crediting/Voiding and/or Payment Adjustments
  10. Trust Accounting considerationsTabs3 Trust Accounting System Version 15.3 allows credit card depositsTalk to your state bar about rules for accepting credit card payments for trust accounts - rules differ by state.Tabs3 Trust Accounting Software lets you assign merchant accounts to each bank account. TSYS Merchant Solutions allows you to designate a separate bank account (such as your operating account) for debiting processing fees, thus providing the ability to properly handle trust funds.<<Enter a deposit in Trust>>When using Tabs3 and Trust you will have 2 different merchant accounts (I am using the same for demo purposes today) Processing fees are debited from the designated account once a month instead of for each transaction for easy reconciliation. When you enter a $100.00 deposit, the full $100.00 is deposited into your bank accountMuch easier to reconcile than dealing with a per transaction fee<<Switch to TSYS Merchant Solutions>>TSYS Merchant Solutions (FNMS)Turn over to Ben Wallace
  11. We chose to work with TSYS Merchant Solutions because they are a top 10 payment processor in the United States, with over 50 years of credit card experience. Our relationship with TSYS Merchant Solutions ensures that all transaction information, for both firm and client, remains safe and secure. Like Tabs3, TSYS Merchant Solutions has an outstanding local support team (not outsourced), so you can call them with any questions you may have about your merchant account.