Unauthorized Credit Card Transactions: Must the Cardholder Pay and What Legal Steps to Take

Must the Cardholder Pay and What Legal Steps to Take

Unauthorized credit card transactions are charges posted to a cardholder’s account that the cardholder did not make, did not authorize, and did not benefit from—whether they occur through a stolen physical card, card details taken online, skimming, phishing, account takeover, or merchant-side compromise. In Philippine practice, the central question is not only “Who pays?” but also “What processes, evidence, and legal remedies control the outcome?”

This article explains the governing legal landscape, how liability is typically allocated, what duties fall on banks and cardholders, and what legal and regulatory steps a cardholder can take.


1) Key Concepts and Why the Answer Is Often “It Depends”

A. “Unauthorized” vs. “Disputed”

Not all “disputed” charges are “unauthorized.”

  • Unauthorized transaction: You did not make it and did not consent.
  • Merchant dispute: You authorized the payment but contest the outcome (e.g., defective goods, non-delivery, cancellation not honored, duplicate billing).
  • Friendly fraud / family use: A relative used the card with or without permission; this can complicate “unauthorized” claims depending on the facts and your prior conduct.

B. Where the transaction happened matters

  • Card-present (in-store, physical terminal) usually relies on chip/PIN, tap, or signature plus merchant procedures.
  • Card-not-present (online/phone) often relies on card details, CVV, and sometimes one-time password (OTP) / 3D Secure.

Evidence differs by channel, and so does the bank/merchant’s ability to prove authorization.


2) The Philippine Legal Framework (High-Level Map)

Unauthorized credit card charges sit at the intersection of contract, consumer protection, banking standards of care, data privacy, and cybercrime laws.

A. Contract: Your Card Agreement (Terms and Conditions)

Credit card relationships are primarily contractual. Most issuers’ terms address:

  • duty to safeguard the card, PIN, OTP, and credentials;
  • reporting obligations (how fast you must notify);
  • investigation process and provisional crediting (if any);
  • exclusions (e.g., sharing OTP, “gross negligence,” late reporting).

But contracts do not operate in a vacuum: consumer protection principles, banking standards, and public policy can limit unfair provisions—especially where the bank’s own security controls are implicated.

B. Banking/Consumer Protection Regulation

Banks and credit card issuers are subject to regulatory expectations on:

  • fair dealing, complaint handling, and dispute resolution;
  • controls against fraud and unauthorized electronic transactions;
  • clear disclosures of fees and consumer obligations.

Regulation doesn’t automatically “erase” liability, but it shapes what a bank must do procedurally and how complaints can be escalated.

C. Civil Law (Obligations and Damages)

The Civil Code principles on obligations, quasi-delicts, and damages can apply where:

  • a party breaches contractual duties (e.g., failure to investigate properly, wrongful billing, refusal to correct proven fraud);
  • negligence causes harm (e.g., weak controls, failure to block suspicious activity, poor authentication).

D. Consumer Protection (General)

General consumer protection concepts support the view that financial services consumers deserve fair treatment, transparent processes, and accessible remedies.

E. Criminal Statutes Commonly Relevant

Depending on the method, unauthorized transactions may involve criminal offenses such as:

  • Access Devices Regulation Act (RA 8484): credit card fraud, possession/use of counterfeit access devices, skimming-related conduct, and other access-device abuses.
  • Cybercrime Prevention Act (RA 10175): computer-related fraud, identity theft-type conduct, illegal access, and related cyber offenses.
  • E-Commerce Act (RA 8792): supports recognition of electronic data/messages; often relevant to proving online transaction trails.
  • Revised Penal Code: estafa, falsification, theft, and related offenses depending on the fact pattern.

Criminal cases punish offenders but do not automatically resolve the civil billing dispute—though police reports and prosecutorial complaints can help document the incident.

F. Data Privacy (RA 10173)

If cardholder data was mishandled—by a merchant, processor, or even an institution—data privacy obligations and breach response may come into play. Data privacy proceedings focus on lawful processing and safeguards, which may support (but do not replace) your billing dispute.


3) Must the Cardholder Pay? The Practical Liability Rules

There is no single one-sentence rule that covers every case because liability turns on authorization and fault (including the cardholder’s conduct and the bank/merchant’s security).

A. Core Principle: The party claiming you authorized the charge must have a credible basis

In practice, issuers rely on records such as:

  • EMV chip verification results, terminal logs, and merchant receipts (card-present);
  • IP/device fingerprints, OTP/3D Secure logs, address verification, tokenization logs (card-not-present);
  • call recordings (phone orders), delivery proofs, and account activity trails.

If you credibly deny a transaction, the dispute becomes: can the bank/merchant show it was authorized, or can you show it was not? Outcomes often hinge on technical logs and credibility.

B. Cardholder’s potential liability increases when there is clear cardholder fault

Examples that commonly undermine a “no liability” claim:

  • you shared your OTP or allowed someone to input it;
  • you gave your card details to a scammer or entered them into an obviously fraudulent site after warnings;
  • you posted sensitive details publicly;
  • long delays in reporting despite clear red flags (depending on the facts and the issuer’s rules).

Even then, liability is not automatic; the real question is whether your conduct legally counts as negligence sufficient to shift loss under the contract and applicable standards.

C. Bank/issuer can be exposed where controls are weak or processes are unfair

Banks are generally expected to maintain robust security and fair dispute handling. Factors that can help a consumer:

  • obvious fraud patterns not flagged (sudden foreign spend, rapid multiple transactions, unusual merchant category);
  • bank failure to apply reasonable authentication steps for risky transactions;
  • refusal to investigate or provide dispute documentation;
  • continuing to bill interest/penalties on amounts credibly contested without a meaningful review.

D. Merchant disputes (not strictly unauthorized) have different “who pays” dynamics

If you authorized the charge but the merchant failed to deliver, delivered defective goods, or did not honor cancellation, the issue is typically resolved through:

  • merchant refund policies and consumer laws;
  • card network chargeback rules (where available);
  • civil remedies for breach of contract.

4) Burden of Proof and Evidence: What Wins Disputes

In real-world disputes, outcomes often turn on documentation. The most persuasive evidence packages typically include:

A. Your evidence

  • Timeline: when you noticed, when you reported, what the bank said, what case/reference numbers were issued.
  • Proof you could not have done it: travel records, work logs, location data, screenshots, sworn statement, corroborating witnesses.
  • Account security facts: phone lost? SIM swap? email compromised? malware? any OTP SMS received?
  • Merchant contact attempts: emails/chats showing you contested the transaction quickly.

B. Issuer/merchant evidence you can request

  • transaction channel details (card-present vs online);
  • merchant name, location, terminal ID;
  • EMV verification method and results (chip, tap, magstripe fallback);
  • OTP/3D Secure logs (whether OTP was successfully entered, timestamp, phone number masked details);
  • delivery proof (for goods), IP/device information (when available).

A common friction point is that consumers are told “it was OTP’d so it’s valid.” That is not always the end of the matter; fraudsters sometimes obtain OTPs through deception, SIM swap, or device compromise. The dispute becomes factual: how the OTP was obtained and whether security was reasonably maintained by the parties.


5) Immediate Practical Steps (That Also Protect Your Legal Position)

Step 1: Notify the issuer immediately and block the card

  • Call the bank hotline and request: block, replace, investigation, and dispute filing.
  • Record the date/time, agent name/ID (if available), and reference number.

Step 2: Freeze related access points

  • Change passwords on email and banking apps linked to the card.
  • Check for SIM swap indicators; coordinate with your mobile provider if your number stopped receiving SMS.
  • Scan devices for malware; revoke suspicious sessions.

Step 3: Submit a written dispute promptly

A strong dispute letter/email typically includes:

  • statement that the transaction(s) are unauthorized;
  • list of disputed charges with dates/amounts/merchant descriptors;
  • when you discovered and when you reported;
  • relevant facts (card in your possession, you were elsewhere, phone lost, etc.);
  • request for reversal/provisional credit and suspension of finance charges/penalties on disputed amounts while under investigation;
  • request for supporting documentation used to claim authorization.

Step 4: Execute an affidavit if required

Banks often require an affidavit of unauthorized transaction or affidavit of loss. Ensure your affidavit:

  • is consistent with your timeline,
  • does not concede facts that harm you (e.g., admitting you “may have shared OTP” unless true),
  • addresses how the fraud likely occurred if you have evidence (phishing, SIM swap, device theft).

Step 5: Consider a police report for clear fraud patterns

For larger losses, repeated unauthorized transactions, identity theft, SIM swap, or hacking indicators, a police report can:

  • document the incident contemporaneously,
  • support requests for telco logs or other investigatory steps.

6) The Dispute Process: Chargebacks, Reversals, and Investigations

A. Issuer-led investigation

The issuing bank typically:

  1. logs your dispute,
  2. reviews transaction data,
  3. may apply “temporary credit” depending on policy and the network rules,
  4. coordinates with the acquiring bank/merchant (especially if a chargeback is filed).

B. Chargeback route (card network mechanism)

A chargeback is not a lawsuit; it is a payment network dispute mechanism. Common chargeback categories include:

  • fraud/unauthorized use,
  • services not provided,
  • goods not received,
  • defective/incorrect goods,
  • cancellation/refund not processed,
  • duplicate processing.

Time windows and documentation requirements can be strict. Late disputes can lose network remedies even if you still have contractual or civil claims.

C. Provisional credit and billing while under dispute

A major consumer pain point is being billed interest/penalties on disputed sums. Best practice is to demand in writing that:

  • disputed amounts be segregated,
  • finance charges related to disputed amounts be suspended pending resolution (where policy allows),
  • minimum due be clarified to avoid adverse credit reporting while you are contesting.

Actual handling varies, so written communications and reference numbers matter.


7) Escalation Options in the Philippines (Regulatory and Administrative)

When internal dispute handling stalls or feels unfair, escalation is often more efficient than immediately filing a court case.

A. Bangko Sentral ng Pilipinas (BSP) – Financial consumer complaints

If the issuer is a BSP-supervised entity, you can file a consumer complaint with the BSP’s consumer assistance channels. Typically, BSP escalation is most effective when you attach:

  • dispute letter and acknowledgement,
  • screenshots and affidavit,
  • bank responses (or lack of response),
  • statement of desired relief (reversal, waiver of fees/interest, correction of records).

BSP intervention usually pushes structured resolution, but it is not the same as a court judgment.

B. Department of Trade and Industry (DTI) – Merchant disputes

If the core issue is a merchant’s failure (non-delivery, defective item, cancellation ignored), DTI complaint/mediation can be relevant—particularly for domestic merchants. For cross-border merchants, chargeback and issuer escalation may be more practical.

C. National Privacy Commission (NPC) – Data breach or mishandling

If you believe your personal data (card details, identity data) was mishandled, or a breach occurred, NPC avenues may apply. NPC processes focus on privacy compliance and safeguards, which can support parallel civil/contract claims.

D. Law enforcement – PNP Anti-Cybercrime Group / NBI Cybercrime units

For hacking, phishing syndicates, SIM swap, skimming, or identity theft, reporting can support investigations and preserve records. This is especially relevant when losses are high or systematic.


8) Civil Legal Remedies (When Complaints Don’t Resolve It)

A. Demand letter

A well-structured demand letter can:

  • crystallize your position and the facts,
  • demand reversal and correction of records,
  • demand waiver of interest/penalties tied to disputed amounts,
  • set a deadline,
  • preserve your claim for damages if warranted.

B. Court action for recovery and/or damages

Possible civil theories include:

  • breach of contract (unfair billing/refusal to correct proven fraud),
  • negligence (failure to maintain reasonable safeguards, failure to act on red flags, wrongful collections),
  • damages for wrongful reporting or harassment (fact-dependent).

Forum choice depends on the amount, the nature of the claim, and procedural rules. For smaller money claims, streamlined procedures may be available; the cap and coverage are set by court rules and can change over time.

C. Injunctive relief (rare, fact-intensive)

In severe cases (e.g., aggressive collections, threatened enforcement actions, imminent credit harm), parties sometimes seek court relief to restrain certain actions, but this is highly fact-specific and procedural.


9) Criminal Legal Remedies (Against Perpetrators)

If you have identifiable perpetrators (or strong leads), potential complaints may be anchored on:

  • RA 8484 (access device/credit card fraud conduct),
  • RA 10175 (computer-related fraud, illegal access, identity-related offenses),
  • Revised Penal Code offenses as applicable.

Criminal proceedings can support recovery (through civil liability attached to criminal action), but collection is still practical-problem-heavy if the offender has no assets or is unidentified.


10) Special Scenarios and How They Are Usually Analyzed

A. Card still with you, but transactions occurred

Often indicates:

  • compromised card details,
  • merchant database leak,
  • phishing,
  • account takeover.

Focus: online logs, merchant patterns, and whether authentication was reasonable.

B. OTP was used (bank claims “therefore authorized”)

OTP is strong evidence, but not conclusive in every scenario:

  • OTP may be obtained by social engineering (phishing calls/texts),
  • SIM swap can reroute SMS OTP,
  • malware can intercept messages.

Your case improves if you can show:

  • you never received the OTP,
  • your SIM was swapped,
  • your phone was stolen,
  • you were actively being phished and reported promptly,
  • multiple suspicious transactions happened unusually fast.

C. Card lost/stolen

If the card was physically stolen:

  • immediate reporting is crucial,
  • merchant procedures (chip/PIN vs magstripe fallback) become central.

D. Supplementary cards and household use

If a supplementary cardholder (or family member) used the card, liability often depends on:

  • what authority they had,
  • prior patterns tolerated by the principal,
  • whether the dispute is truly “unauthorized” or an internal household conflict.

E. Merchant refund promised but not posted

That is typically a merchant dispute:

  • document refund promise (email/chat),
  • monitor settlement timelines,
  • escalate through merchant, then issuer dispute, then DTI/chargeback path as appropriate.

11) Protecting Yourself Against “Secondary Harm”: Credit Records and Collections

Unauthorized transactions can lead to:

  • collection calls,
  • negative credit reporting,
  • account suspension.

To protect yourself:

  • insist that the account be annotated as “in dispute” in internal notes;
  • request written confirmation of dispute receipt and the disputed items;
  • pay undisputed amounts to avoid default triggers (without conceding disputed items);
  • keep all communications in writing after the initial hotline report.

12) Practical Checklist (Evidence and Actions)

Within 24 hours

  • Block card, request replacement, get reference number
  • Change passwords, secure email, check SIM status
  • File written dispute (email/online form)

Within a few days

  • Execute affidavit (if required)
  • Gather supporting records (travel/location proof, screenshots, telco notes)
  • Request transaction documentation

If unresolved

  • Escalate to BSP (issuer) and/or DTI (merchant dispute) as applicable
  • Consider NPC if there is a data privacy angle
  • Consider police/NBI/PNP-ACG report for clear fraud patterns

If still unresolved

  • Send formal demand letter
  • Evaluate civil action for recovery/damages (fact- and amount-dependent)

13) Bottom Line

Whether the cardholder must pay for unauthorized credit card transactions in the Philippines is determined by a fact-driven assessment of authorization, security practices, timely reporting, and the quality of the issuer/merchant’s evidence and dispute handling. The fastest path is usually: immediate reporting + written dispute + documentation + escalation to the appropriate regulator when internal resolution fails. Civil and criminal remedies remain available when administrative and contractual mechanisms do not produce a fair correction.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.