What This Code Means
Amex reason code F30 – EMV Counterfeit Transaction is issued when a chip-enabled card was used in a fraudulent transaction but the merchant's terminal processed it via magnetic stripe swipe rather than chip insertion. The result: under the EMV liability shift rules in effect since 2015, the merchant — not the issuer — bears the fraud loss.
Counterfeit fraud works by criminals encoding stolen card data onto a blank card's magnetic stripe. If your terminal reads the chip, the chip's dynamic cryptogram prevents fraud. If your terminal swipes, it reads only the static magnetic stripe data — and the counterfeit works. This is exactly the attack EMV was designed to stop, which is why Amex (and all networks) shift liability to merchants who bypass the chip.
F30 is almost always unwinnable if your terminal swiped a chip card. The path forward is prevention: every card-present merchant must operate EMV-certified terminals.
Cross-Network Comparison
| Network | Code | Name |
|---|---|---|
| American Express | F30 | EMV Counterfeit Transaction |
| Visa | 10.1 | EMV Liability Shift Counterfeit Fraud |
| Mastercard | 4870 | Chip Liability Shift |
| Discover | AT | Authorization Noncompliance |
| Amex | F24 | No Cardholder Authorization |
Common Trigger Scenarios
- Non-EMV terminal: The most common scenario. Your POS terminal is not chip-capable and swipes all cards. Any chip card fraud results in merchant liability.
- EMV-capable terminal, chip bypass allowed: Your terminal can read chips, but your POS software or settings allow customers or staff to bypass chip insertion and swipe instead. The bypass negates your liability protection.
- Fallback transaction without proper documentation: The chip failed to read after multiple attempts and you performed a magnetic stripe fallback. If the fallback wasn't properly documented per Amex rules (or the chip failure was fraudulently induced), you bear the liability.
- Unattended terminal counterfeit: A fraud device was installed on a self-service kiosk or gas pump that forces magnetic stripe reads, resulting in counterfeit fraud chargebacks on the affected merchant.
Key Deadlines & Timeframes
| Event | Timeframe |
|---|---|
| Cardholder dispute window | Up to 120 days from transaction date |
| Merchant response deadline | 20 calendar days from chargeback notification |
| EMV liability shift in effect | Since October 2015 (Amex) |
| Amex second review | Varies; typically 30–45 days after first response |
Evidence You'll Need
- Proof of EMV-certified terminal: If your terminal IS chip-capable, provide your terminal's EMV certification documentation and show that the transaction was processed via chip, not swipe. A chip transaction will show in your processor logs as an ICC (Integrated Circuit Card) read.
- Chip failure / fallback documentation: If a legitimate chip failure occurred, provide your processor's fallback transaction record, showing the number of chip read attempts and the fallback reason code. Amex requires specific documentation for fallback transactions to be accepted.
- Transaction receipt showing chip read: The receipt from an EMV terminal should show "CHIP READ" or "ICC" as the entry mode. A receipt showing "SWIPE" on a chip card is evidence against you, not for you.
- Cardholder ID verification: If you collected a photo ID at the point of sale and matched it to the card, this may support your response even in a swipe scenario — though it rarely defeats an F30 outright.
- Security footage: In cases where a specific fraudulent transaction occurred at a known time, video footage showing the cardholder's presence and the transaction may be submitted.
How Merchants Lose This Dispute
- Non-EMV terminal — period: There is no winning response if your terminal is not EMV-capable and you processed a chip card via swipe. The liability shift is absolute for counterfeit fraud.
- Undocumented fallback transaction: If you performed a fallback without the processor-generated fallback documentation, Amex treats it the same as a willful swipe. Document every fallback at the time of the transaction.
- Submitting a receipt that shows "SWIPE": This is affirmative evidence that you bypassed chip. Do not submit a receipt showing magnetic stripe entry mode for an F30 dispute.
- Claiming the cardholder was present without chip evidence: The cardholder being physically present does not defeat F30 — the code is about how the card was read, not whether the cardholder was there.
- Missing the 20-day window: Automatic loss. Respond promptly even if your defense is limited, to preserve any secondary review rights.
Response Framework Overview
An F30 response has a very narrow path to success. Structure it around one of these scenarios:
- Chip-read transaction: Prove your terminal read the chip (ICC entry mode in processor logs + terminal certification). This is the only clean win — it means the chargeback was filed in error.
- Documented fallback: Submit the processor-generated fallback documentation showing chip failure, the fallback reason code, and compliance with Amex fallback rules. This can shift liability back to the issuer in limited cases.
- Magstripe-only card: If the card involved had no chip (rare for Amex cards), document this with the card's PAN and request that Amex confirm the card was magstripe-only. Liability shift does not apply to magstripe-only cards.
If none of these apply, accept the chargeback and invest that energy in upgrading your terminal hardware.
Prevention Tips
- Upgrade to EMV-certified terminals immediately: This is non-negotiable for card-present merchants. Every terminal that accepts chip cards must be EMV-certified. There is no workaround.
- Disable chip bypass in your POS software: Even with EMV hardware, some POS configurations allow staff to bypass chip insertion. Disable this option system-wide so no swipe of a chip card is possible.
- Audit your fallback procedures: Establish a clear fallback SOP: attempt chip 3 times, log each attempt, trigger a documented fallback only then. Review fallback logs monthly for unusual volume.
- Inspect unattended terminals regularly: Gas pumps, kiosks, and unattended POS are high targets for skimming device installation. Implement tamper inspection at shift change.
- Enable Amex SafeKey (3DS) for CNP: For your online channel, 3DS eliminates most F24 fraud and complements your card-present EMV compliance for an end-to-end fraud defense.
Frequently Asked Questions
What is Amex reason code F30?
Amex F30 (EMV Counterfeit Transaction) is triggered when a chip card was swiped instead of chip-read, and counterfeit fraud resulted. Under the EMV liability shift, the merchant who failed to use chip technology bears the loss.
How do I avoid Amex F30 chargebacks?
Use an EMV-certified terminal and never allow magnetic stripe bypass for chip cards. Proper EMV chip reads generate dynamic cryptograms that prevent counterfeit fraud entirely.
Can I win an Amex F30 chargeback?
Only if you can prove the transaction was processed via chip (ICC entry mode), the card was magstripe-only (no chip), or a documented fallback was performed per Amex rules. A swipe of a chip card is essentially unwinnable.
What is the EMV liability shift?
The EMV liability shift (effective October 2015 for Amex) transfers counterfeit fraud liability to whichever party doesn't support EMV. If a merchant's terminal can't read chips, they bear the fraud loss instead of the issuer.