ITRC Fact Sheet 131
Credit Card vs. Debit Card

 This fact sheet will cover:

The World of Debit vs. Credit

According to a Nilson Report in April, 2009, 78 percent of American households - about 91.1 million - had one or more credit cards at the end of 2008. “In less than 15 years, debit card transactions in the United States grew from 1 percent of noncash transactions to more than 50 percent." (Source: Tower Group, August 2009)

Visa reports there are 309 million Visa credit cards and 352 million Visa debit cards in circulation in the United States. MasterCard states that as of Sept. 30, 2009, there were 211 million MasterCard credit cards and 130 million debit cards. According to data from the U.S. Census Bureau, there were 159 million credit cardholders in the United States in 2000, 173 million in 2006, and that number is projected to grow to 181 million Americans by 2010.

The fact of the matter is banks make money on purchases made with debit or credit cards. Whether it is a percentage based fee on a “signature” transaction or a flat fee for a PIN-based transaction, banks profit from consumers’ growing use of plastic.

You have two main choices when making purchases with a card:

Credit cards – making purchases with the creditor’s money until billed
Debit cards – having your money immediately extracted from the linked account

What is a credit card?

A credit card is a bank-issued card that allows people to purchase goods or services from a merchant and to pay for them at a later date. Every month the credit card company provides a bill, which reflects the card activity during the previous 30 days. Also, credit cards may be sponsored by large retailers (such as major clothing or department stores) or by banks or corporations (like VISA, MasterCard or American Express).

 About Credit Cards:

Fair Credit Billing Act

 What is an ATM Card?

The ATM card is the most basic form of “plastic.” An ATM card is offered by financial institutions as a method of withdrawing cash/funds through the use of Automated Teller Machines. In addition to withdrawing money, you can check account balances, transfer money between accounts or deposit funds into an account. The Debit feature, adding the ability to make purchases, is a feature now offered by most financial institutions.

 What is a Debit Card?

According to the Federal Deposit Insurance Corporation (FDIC), a debit card looks like a credit card but works like an electronic check. A debit card is linked with the customer’s checking or banking account. When used, money is immediately withdrawn from that account. There are two ways for a merchant to process a debit card transaction:

The problem with Debit cards is that they can be used for credit without your PIN. The swiping of a debit card, with the use of a forged signature, can easily wipe out your account/s.

Debit Cards

Electronic Funds Transfer Act

 The Dangers of Plastic Cards: 


A growing threat to both credit card and debit card users is an activity commonly known as "skimming."  Skimming occurs when thieves set up a scanning device that captures the magnetic strip and keypad information from ATM machines, gas pumps, and retail and restaurant checkout devices.  This allows for the duplication of the card enabling it to be used as either a debit or credit card.

Example 1: 

After the waiter takes your debit card for payment, he skims (scans) the card before returning it to the table. With this number in hand, there exists the possibility of duplicating that number onto a fraudulent debit card. At this time, the new card may be swiped as a CREDIT purchase without the need for a PIN number.

Example 2: 

You pull into a gas station to fill up your tank. Someone has mounted a skimmer on the face of the point of purchase device. At this point, the thief has the information necessary to create a fraudulent card. Additionally, an extra device may be placed within the line of sight of the keypad to video record your PIN code.

Key Logging 

Key logging comes in two forms: the first form is a physical device which can be attached to a computer, most commonly via the keyboard input port. These devices tend to collect a finite number of key strokes. The device can then be removed and used by the thief to see every key stroke made on that computer.

The second form of key logging is software-based. In other words, this is a program which may be added to your computer by logging into a website, receipt of a bogus email, or the exposure to a virus or Trojan horse. This type of key logging will transmit your exact key strokes to a remote location where the thief can have access to it. This occurs whenever your computer is logged on to the internet.

Example 1: 

Mr. Brown is a traveling salesman staying at a well-known hotel equipped with a business center. He uses the business center computer to access various accounts. Once he leaves the computer, the thief comes by and removes the physical key logger device.

Example 2: 

A software-based key logging program has been loaded on your computer by way of a Trojan horse. Unaware, you go through your day to day on-line activities which included monitoring your financial accounts, accessing emails, on-line shopping, etc. The entire time your computer is linked to the internet, it is communicating your keystrokes to a remote site. The thief may then retrieve this information at will.

ITRC Recommendations: 


This fact sheet should not be used in lieu of legal advice. Any requests to reproduce this material, other than by individual victims for their own use, should be directed to This email address is being protected from spambots. You need JavaScript enabled to view it..