Can I use a debit card when shopping online?

1 Answer

Answer :

You can, but it is safer to use a credit card. The maximum liability for unauthorized charges on a credit card is $50. Liability for unauthorized use on a debit card can be much higher, depending upon when you report the loss. And most debit cards are linked to your bank account, which means a thief could wipe you out and you would be without money until your bank investigates the loss and makes provisional credit.

Related questions

Description : I like to shop online, but I worry about entering my personal information at various sites. How can I tell if a site is safe?

Last Answer : First of all, shop only with online merchants you trust. Consider entering your payment card numbers each time you purchase something, instead of allowing the site to store your number for future purchases. Then ... the site. Simply enter the site's name plus the word complaints in a Web browser.

Description : What kind of tools are available to help keep my children safe online?

Last Answer : Special software designed to manage Internet use can help you keep your children and teens safer. Most operating systems also include settings you can use to keep your kids safe online. Learn about family safety tools at kids.getnetwise.org/tools.

Description : How can I avoid online marketers?

Last Answer : The best way to reduce the amount of online marketing you're subjected to is by guarding your personal information while on the Web. In other words, reveal as little as possible about yourself at ... inbox as clear of unwanted messages as possible. There are many free email services to choose from.

Description : How do online marketers get my information?

Last Answer : Anytime you fill out a form, enter an online contest, or otherwise submit information electronically there is the potential it will be used for marketing purposes-by the company whose site you are ... to access free Web services, join social networks, play online games and visit virtual worlds.

Description : Why should I care about reducing my exposure to online marketers?

Last Answer : Unwanted marketing messages can be a nuisance and even, in some cases, an invasion of your privacy. Parents of children and teens should be vigilant about websites that market to youngsters, because ... exploit young people by inducing them to desire things that are not in their best interest.

Description : How do crooks and con artists find their victims online?

Last Answer : Crooks and scammers have many ways to find their potential victims, and they're constantly coming up with new ones. Beware of: 4 Phishing-an attempt to hook you into revealing your personal ... meet online contacts in person may be at risk; or the sites may compromise your personal information.

Description : How do I know if a site will use my information for marketing purposes?

Last Answer : Read the “Privacy Policy” for sites you interact with to learn how they could use your information and whether or not they will sell or trade your contact information.

Description : Is it safe to use the Internet at my local library?

Last Answer : If you follow some basic guidelines, you can use your library's computers without compromising your safety or privacy: 4 Never save your log-on information to websites on a public computer. ... t enter your credit card or bank account number or other sensitive information into any public computer.

Description : I received an email with an attachment from someone I don’t know. What should I do?

Last Answer : Be careful about opening attachments-the file you receive could contain a virus, spyware, or inappropriate content. Likewise, be careful about visiting unfamiliar websites, downloading free ... unwanted software in the download. And unauthorized file sharing of copyrighted material is illegal.

Description : Are there any special precautions for users who access the Internet on a public computer?

Last Answer : It's a good idea not to let your Web browser save sensitive ID and passwords, like your bank account login or your credit card info for one-click shopping. This is especially important at shared ... visited. Use your browser's Help function to find out how to use private-or incognito -browsing.

Description : I plan to get rid of my computer and get a new one. How can I make sure nobody can access the data on my old machine?

Last Answer : It's necessary to erase your hard drive completely and permanently before selling, donating or disposing of your computer. (Simply deleting files isn't enough.) Some operating systems come with their own ... or hard drive to a trusted local computer repair shop and ask them to overwrite your files.

Description : How do I know when to update my software?

Last Answer : Set your operating system and other software to update automatically. You can choose to run updates at convenient times when you are not using the computer.

Description : How can I make sure I don’t permanently lose important data on my computer?

Last Answer : Because there’s no guarantee that a virus or malware won’t corrupt your data, your best defense is to back up your files regularly—that means at least once a week. StaySafe.org offers information and instructions for backing up important files. Most new computers come with automatic backup settings.

Description : Should I be worried about my children and teens using the Internet?

Last Answer : You shouldn't be worried, but you should be cautious. Here are some tips: 4 Discuss the various risks of Internet use. 4 Set clear rules about what your kids can do and which ... about any threatening or inappropriate communication, including bullying. 4 Explain why it's wrong to bully others.

Description : Can companies and marketers collect data from my children?

Last Answer : The Children's Online Privacy Protection Act [COPPA] requires sites to obtain parental consent for the collection or use of any personal information from children under 13. Still, instruct your children ... activity by teens, who may be susceptible to activities that are not in their best interest.

Description : What are cookies, and what do they do?

Last Answer : A cookie is a piece of information stored on an Internet user's computer by a Web browser. It allows the site being visited to record such things as the visitor's shopping cart contents and user ... This means the site will not retain any of your information or recognize you as a returning visitor.

Description : What is a privacy policy, and where do I find it?

Last Answer : Legitimate companies will have a privacy policy that clearly states when and how the company might use your information. Leave the site if you are not satisfied that your privacy will be protected. ... mark logos on the site, such as TRUSTe and BBBOnline, that certify trustworthy privacy policies.

Description : I’m having trouble updating my old computer. Why?

Last Answer : If you have an older computer, you may no longer receive updates and security patches, and the manufacturer probably does not offer support for your computer. New versions of browsers have important ... dropped in price so that a new-and more powerful-computer can be purchased for around $400.

Description : Is it safe to send sensitive data via email or instant messaging (IM)?

Last Answer : No, you shouldn’t send sensitive personal information like credit card numbers, passwords, your date of birth or Social Security number using email or IM on your computer or any other Web-enabled devices such as a smartphone, tablet or personal digital assistant (PDA).

Description : What precautions should I take when using public wi-fi?

Last Answer : Today most laptops have the ability to connect to wireless Internet networks (wi-fi). These can be found in public places such as coffee shops, airports, hotels, etc. Be cautious about entering personal ... (the s stands for secure). Turn off your wireless connection when you're not using it.

Description : What is a wireless network, and how do I make mine secure?

Last Answer : A wireless network (wi-fi) is a common way for computer users to access the Internet at home or work using radio waves rather than cables to transmit data. Leaving your network unlocked ... for the default password that comes from the manufacturer and ensure that you have a secure connection.

Description : What makes a password strong?

Last Answer : A strong password includes a seemingly random string of letters, numbers and symbols. It should never include personal information such as your birth date, address or pet's name. The longer ... Try for least eight characters, including upper and lowercase letters, numbers and symbols, if allowed.

Description : What does it mean to “update” my computer and software?

Last Answer : Computer and software companies frequently update their programs to include protection against the newest security threats. So, simply updating your operating system and software whenever new versions become available gives ... down, so set your computer to update at times you are not using it.

Description : How does a spam filter work?

Last Answer : Most ISPs and email programs now include an automatic spam filter, which reduces the number of unwelcome email messages that make it to your inbox. Delete, without opening, any spam or junk mail that ... you want to hear from to your address books, which may save them from being flagged as junk.

Description : What is antispyware?

Last Answer : Spyware is software that tracks your computer activity, gathering information without your knowing it. Antispyware is software that blocks or removes spyware. Some virus protection products include antispyware features. Like antivirus software, antispyware needs to be updated regularly.

Description : What is antivirus software?

Last Answer : Antivirus software scans everything that goes into your computer, looking for known viruses. Because new viruses are created all the time, you have to update your antivirus software ... to virus protection software that automatically installs updates to your computer as they become available.

Description : What is a firewall?

Last Answer : A firewall is a virtual barrier between your computer and the Internet. Everything coming into or leaving your computer must go through the firewall, which blocks anything that doesn't meet specific security ... 8, for example) to locate the built-in firewall and determine whether it's turned on.

Description : What can I do to protect myself?

Last Answer : There are many practices and tools that will help you protect your computer and data. 4 Use a firewall. 4 Install antivirus software. 4 Install antispyware. 4 Use a spam filter. 4 Perform timely updates. 4 Create strong passwords. 4 Secure your wireless network.

Description : Why would someone want to steal or damage the data on my computer?

Last Answer : Some people commit malicious acts with no other goal than to create problems for others. Theft, on the other hand, generally has the goal of financial gain through the use of the stolen information.

Description : How can I avoid malicious websites?

Last Answer : Never click on, or copy and paste, links that are sent to you by people or companies you don't know. If you want to verify that the site is legitimate, type (don't copy) the homepage ... bar. When doing an online search, visit only results that are well known and trusted sources of information.

Description : What’s the difference between a virus, a worm, a Trojan and spyware?

Last Answer : All these types of malicious software, or malware, pose a serious threat to your computer and data. 4 A virus invades a computer and copies, deletes or damages data. 4 A worm is a ... numerous pop-up ads, and may steal your personal information or change your computer settings without your knowing.

Description : What does a phishing email look like?

Last Answer : Typically, a phishing email appears to come from a financial institution, a large company, a chain store, a social networking site, or a government agency. The messages try to mimic a legitimate site by ... or phone directory. And remember, if something appears too good to be true, it probably is.

Description : What are some of the risks that Internet users face?

Last Answer : The main risks Internet users face include: 4 Inappropriate or unwanted contact (cyberbullying and spamming, for example) 4 Inappropriate or inaccurate content (pornography and hate sites, for example) 4 Deceptive or fraudulent commerce (counterfeit and malicious sites, for example)

Description : Which one is not online payment mode? a) Cash on delivery b) Debit card c) Credit card d) E-cheque

Last Answer : d) E-cheque

Description : Which one is not an online payment mode? a. Cash on delivery b. Debit card c. Credit card d. e‐cheque

Last Answer : a. Cash on delivery

Description : I used my debit card at a gas station in another state the other day. Now they are texting me about specials. Can my bank legally give out my phone number at businesses where I use my card?

Last Answer : It sounds like something that might fall under your state laws. Google your state laws, that’s where I would start.

Description : Help! How can I get paid in bitcoin and use a bitcoin debit card?

Last Answer : answer:You don't say where you live, so it is hard to answer. First of all, you have to find someone willing to pay you in bitcoin. That won't be in the US, but maybe you can find an ... very many bitcoin ATMs that will convert to real money. I live near San Francisco, and there are only a few.

Description : How can I use my debit card without knowing my pin number, or any of my accounts information?

Last Answer : Yes, go to your bank with identification. I have an on-line access to my account and can change the pin number, just have to log on with my ID and password.

Description : Does anyone use the American Express debit card?

Last Answer : answer:

Description : Does anyone use the Skylight prepaid debit card?

Last Answer : answer:Never heard of it, but myskylightcard.com has a location finder, and instructions for how to do so. Note that the instructions inform you that some locations may charge a small fee to ... would use this. What is the advantage over just using a debit card connected to your bank account?

Description : What's better when traveling, use your credit card to get cash or use your bank debit card?

Last Answer : I would guess that withdrawing cash from an ATM is cheaper using a debit card than a credit card as the credit card company nomally charge you a fee on top of the higher rate of interest.

Description : Is it safe to use your debit card at gas pumps?

Last Answer : john65pennington I think that Shell is adding a bit of security. When I use my credit card at Shell I have to enter my zip code. If I type it wrong I have to go inside and talk to the clerk. You should be fine with your debit card.

Description : Why do banks care if you use debit or credit when paying with your bank card?

Last Answer : The law protects you if you use a credit card for purchases. You are not liable in case of fraud, etc. The bank must pay or go after the company, and you have limited liability. With a debit ... like gasoline or groceries. Instead, use your debit card to pay bills you are sure you owe, etc.

Description : My protagonist in a second childhood novel will use his credit & debit card from his previous life. What happens later?

Last Answer : OK, I can’t be bothered to write your novel for you unless I get a decent ghost’s pay, but here is a must. The whole thing begins to unravel when investigators of thse bogus charges made to the dead man’s credit cards track the purchases down to young Tanaka and charge him with murder.

Description : A) PayUmoney Explanation: It can allow even the smallest of merchants to start accepting card based payments. It can accept all credit/debit cards. The POS terminal is easy to set up, can be ... , a merchant can start using a PayUmoney POS terminal within 48 hours of signing up for the service.

Last Answer : Which of the following company launched “Receive and Win” campaign for Ramzan? A) Mobikwik B) Freecharge C) Paytm D) MoneyGram E) Udio

Description : Have you successfully retrieved money from a fraud claim you filed on your debit card?

Last Answer : I did. It took a few days, but I only dealt with my bank. Actually, the bank had called me first, suspecting that the transaction was fraudulent.

Description : Have chip-card debit credit cards been a failure in the US?

Last Answer : I have had fewer problems with chip cards than I did with cards that only had a mag strip that got scratched and unreadable. And he problems seem to be the reader, not the cards. My cards also don’t get bent or sat upon. I have a metal wallet that I carry in my front pocket.

Description : Why are the ATM machines still busy, if people can pay with credit card, and debit card just about any store nowadays?

Last Answer : It doesn’t cost me anything to use the ATM at my bank. And sometimes I just want to pay with cash. If I’m out with friends, I pay my share with cash. At strange gas stations away from home I prefer to pay with cash. Buying a quick donut or sandwich, cash.

Description : Can you buy food with a debit card if it has a negative balance?

Last Answer : Depends on your bank’s policy. Mine would allow it then slap me with some hefty overdraft fees.

Description : When a debit card does not have a chip, am I still able to track it?

Last Answer : Yes. The company who issued the card will be able to track where yours was last used.