What is a Card Not Present Transaction?
A card not present (CNP) transaction is any payment where the cardholder doesn't physically hand over the card — phone, online, mail order, in-app, or recurring billing. Because there's no chip, PIN, or face-to-face check, the merchant carries the chargeback liability if it turns out to be fraud. CNP is the largest single category of card fraud loss in the UK.
A card not present (CNP) transaction is any card payment where the physical card isn't presented to the merchant — phone payments, e-commerce checkouts, mail order, in-app purchases, and recurring billing all count. MOTO (mail order, telephone order) is a subset of CNP. Because there's no chip-and-PIN to verify the cardholder, merchants are liable for fraud chargebacks unless they've used 3D Secure or another recognised liability-shift method. CNP fraud accounts for the majority of UK card fraud losses, which is why descoping technologies like DTMF masking and pause-and-resume call recording matter so much for phone payments.
The shorthand most merchants use is CNP, but you'll also hear card-not-present, remote payment, and (for phone and mail specifically) MOTO. They all describe the same regulatory category: a transaction where the merchant can't physically inspect the card or confirm the person tapping the keypad is the legitimate cardholder. That single fact drives everything else — the higher interchange fees, the chargeback liability, the PCI DSS scope, and the fraud controls every CNP merchant has to layer on top.
How CNP Transactions Work
In a traditional card-present transaction, the customer physically inserts, taps, or swipes their card at a terminal. The terminal reads the chip or magnetic stripe, and the cardholder may enter a PIN or provide a signature. These physical checks create a strong link between the card, the cardholder, and the transaction.
In a card not present transaction, none of those physical verification methods are available. Instead, the merchant collects card details -- typically the card number, expiry date, and the three-digit security code on the back -- through an alternative channel. That might be a website checkout form, a phone call, a postal order form, or a mobile app.
Because the merchant cannot physically verify the card or confirm the person using it is the legitimate cardholder, CNP transactions rely on other forms of verification to establish trust.
Common Types of CNP Transactions
- Telephone payments (MOTO) The customer provides card details by speaking them to an agent or by entering them on their phone keypad during a call. This is one of the oldest and most widespread forms of CNP payment.
- E-commerce The customer types their card details into an online checkout form, often with additional authentication through 3D Secure.
- Mail order Card details are written on an order form and sent by post -- still used by some catalogue retailers and subscription services.
- Recurring payments Card details stored securely on file are used for ongoing subscriptions, memberships, or repeat billing without the customer needing to re-enter them each time.
- In-app payments Card details saved within a mobile application are used to pay for goods or services with a single tap.
Why CNP Fraud Is So Common
CNP transactions account for the vast majority of card payment fraud in the UK and globally. The reason is simple: a criminal does not need the physical card. All they need are the card details -- the number, expiry date, and security code -- which can be obtained through data breaches, phishing attacks, social engineering, or dark web marketplaces.
According to UK Finance, CNP fraud consistently represents the largest single category of card fraud losses in the United Kingdom, running into hundreds of millions of pounds every year. Online and telephone channels are the primary targets because they lack the physical verification that makes in-person fraud more difficult.
To put it in everyday terms: if someone steals your wallet, they can only use your card until you notice and cancel it. But if they steal your card details from a database, they can make purchases from anywhere in the world without you realising until the charges appear on your statement.
Security Measures for CNP Payments
Several technologies and processes have been developed to reduce CNP fraud and protect both merchants and cardholders.
Card Security Codes
The three-digit CVV, CVC, or CV2 code printed on the back of the card provides an additional verification layer. Because this code is not stored on the magnetic stripe or chip, it cannot be captured through card skimming at physical terminals. Merchants are prohibited from storing security codes after a transaction is authorised.
3D Secure Authentication
For online transactions, 3D Secure (marketed as Visa Secure, Mastercard Identity Check, or similar) adds a step where the cardholder verifies their identity through their issuing bank. This usually involves a one-time passcode sent by text message, approval through a banking app, or biometric confirmation. It shifts fraud liability from the merchant to the card issuer when used correctly.
DTMF Masking for Phone Payments
Telephone payments have historically been one of the hardest CNP channels to secure. When a customer reads their card number to an agent, that data passes through the call audio, gets captured in call recordings, and is visible on the agent's screen. DTMF masking technology solves this by intercepting keypad tones before they reach the agent, routing the card data directly to the payment processor without it ever entering the merchant's environment.
Address Verification Service (AVS)
AVS checks the billing address provided by the customer against the address registered with the card issuer. A mismatch does not necessarily mean fraud, but it raises a flag that the merchant can investigate before completing the transaction.
Velocity Checks and Risk Scoring
Payment processors monitor transaction patterns for signs of fraud. Multiple rapid transactions on the same card, transactions from unusual locations, or purchases that do not match the cardholder's typical behaviour can all trigger additional checks or automatic declines.
CNP and PCI DSS Compliance
Because CNP transactions involve capturing and transmitting card data without physical verification, they fall squarely within the scope of PCI DSS. Any system that touches card data during a CNP transaction -- whether that is a website, a phone system, a call recording platform, or an agent workstation -- must meet the relevant PCI DSS requirements.
For businesses that take payments over the phone, this can mean a significant compliance burden. Every system in the payment chain needs to be assessed, secured, and regularly tested. This is where descoping technologies like DTMF masking become particularly valuable -- by preventing card data from entering the merchant's environment, they dramatically reduce the number of systems that need to comply with PCI DSS.
The Merchant's Perspective
For businesses, CNP transactions are essential. They open up revenue channels that would not exist if every customer had to present their card in person. Phone payments, online sales, subscription billing, and remote services all depend on the ability to process CNP transactions securely.
The challenge is balancing convenience against risk. Too many security checks and customers abandon their purchase. Too few, and fraud losses mount up alongside the chargebacks and reputational damage that come with them. Getting this balance right requires the right combination of technology, processes, and partner selection.
Paytia exists because the riskiest CNP channel -- taking card details over the phone -- is also the one most businesses still need to use. Customers ring up to pay an invoice, book a service, or make a deposit, and someone has to take that payment without exposing the business to PCI DSS scope or fraud liability.
Paytia's platform turns a phone payment into a card-not-present transaction that behaves more like a card-present one for compliance purposes. The customer keys their card number on their phone keypad rather than reading it aloud. DTMF suppression prevents the tones from reaching the agent or the call recording, and the card data is routed directly to the payment processor through Paytia's PCI DSS Level 1 certified infrastructure.
The agent never hears the card number. The call recording never captures it. The business systems never store it. The CNP transaction still settles through the merchant's normal acquirer, but the cardholder data has been kept out of the merchant environment entirely -- which removes the contact centre from PCI DSS scope and eliminates the largest single source of CNP fraud exposure inside a typical business.
Frequently Asked Questions
Is a phone payment always card-not-present?
Yes. Any payment where the customer reads or keys their card details to a remote system, rather than presenting the physical card to a chip reader, is a card-not-present transaction. This includes phone, online, mail order, payment links, and subscription renewals.
What is the difference between CNP and MOTO?
MOTO (Mail Order, Telephone Order) is a subset of CNP. All MOTO transactions are CNP, but not all CNP transactions are MOTO -- for example, a regular e-commerce checkout is CNP but not MOTO. Card networks and acquirers often use MOTO as a specific transaction-coding category for telephone and mail-based payments.
Who is liable for fraud on a card-not-present transaction?
In most cases, the merchant is liable for fraudulent CNP transactions. Liability shifts to the issuer only when the merchant has correctly used a recognised fraud-prevention method, such as 3-D Secure for online payments. For telephone payments, there's no equivalent automatic liability shift, which makes the choice of payment method especially important.
Does PCI DSS apply to all card-not-present transactions?
Yes. Every business that accepts, transmits, or stores card data -- regardless of channel -- falls under PCI DSS. The compliance level required depends on transaction volume, but the rules apply from the first transaction. CNP channels often pull more of a business into PCI scope than card-present channels because the card data passes through more systems (websites, contact centres, CRMs, recordings).
How can a business reduce card-not-present fraud?
Online: enforce 3-D Secure, use AVS and CSC checks, monitor for velocity and geo-anomalies. Telephone: use a payment method that keeps the card data away from agents (DTMF suppression or agent-assisted IVR), control call recording so card numbers can never be captured, and train agents to refuse to accept verbally-read card numbers in the first place. Removing card data from the environment is more effective than trying to protect it once it's there.
What is a card-not-present indicator?
Card networks tag every transaction with a code indicating how the card was presented -- chip, swipe, contactless, manually keyed, e-commerce, or telephone order. The CNP indicator triggers the network's CNP rules: different interchange fee, different chargeback rights, different fraud-monitoring thresholds. Merchants don't usually set this directly; the payment processor sets it based on how the transaction was submitted.
See how Paytia handles card not present (cnp)
Book a personalised demo and we'll show you how our platform works with your setup.
Trusted by law firms, insurers, healthcare providers and regulated businesses worldwide. Learn more about Paytia